{"id":"CVE-2014-3564","details":"Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to \"different line lengths in a specific order.\"","modified":"2026-01-27T04:12:43.756049Z","published":"2014-10-20T17:55:05Z","withdrawn":"2026-01-27T04:12:43.756049Z","related":["MGASA-2014-0340","openSUSE-SU-2024:10466-1"],"references":[{"type":"ADVISORY","url":"http://www.debian.org/security/2014/dsa-3005"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1113267"},{"type":"WEB","url":"http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git%3Ba=commit%3Bh=2cbd76f7911fc215845e89b50d6af5ff4a83dd77"},{"type":"WEB","url":"http://seclists.org/oss-sec/2014/q3/266"},{"type":"WEB","url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"},{"type":"WEB","url":"http://www.osvdb.org/109699"},{"type":"WEB","url":"http://www.securityfocus.com/bid/68990"}],"schema_version":"1.7.3"}