Description
The Kleopatra component before 3.1.12 (and before 20.07.80) for GnuPG allows remote attackers to execute arbitrary code because openpgp4fpr: URLs are supported without safe handling of command-line options. The Qt platformpluginpath command-line option can be used to load an arbitrary DLL.
Exploits (1)
References (6)
Core 6
Core References
Patch, Vendor Advisory x_refsource_misc
https://dev.gnupg.org/rKLEOPATRAb4bd63c1739900d94c04da03045e9445a5a5f54b
Exploit, Vendor Advisory x_refsource_misc
https://dev.gnupg.org/source/kleo/browse/master/CMakeLists.txt
Third Party Advisory vendor-advisory
x_refsource_gentoo
https://security.gentoo.org/glsa/202008-21
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IRIPL72WMXTVWS2M7WYV5SNPETYJ2YI7/
Broken Link, Mailing List, Third Party Advisory vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00053.html
Broken Link, Mailing List, Third Party Advisory vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00064.html
Scores
CVSS v3
8.8
EPSS
0.2134
EPSS Percentile
95.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Details
CWE
CWE-116
Status
published
Products (4)
fedoraproject/fedora
32
kleopatra_project/kleopatra
< 20.07.80
opensuse/backports_sle
15.0 sp1
opensuse/leap
15.1
Published
Aug 29, 2020
Tracked Since
Feb 18, 2026