Description

In GnuPG before 2.5.17, a crafted CMS (S/MIME) EnvelopedData message carrying an oversized wrapped session key can cause a stack-based buffer overflow in gpg-agent during PKDECRYPT--kem=CMS handling. This can easily be leveraged for denial of service; however, there is also memory corruption that could lead to remote code execution.

INFO

Published Date :

2026-01-27T18:36:56.727Z

Last Modified :

2026-01-27T20:08:54.449Z

Source :

mitre
AFFECTED PRODUCTS

The following products are affected by CVE-2026-24881 vulnerability.

Vendors Products
Gnupg
  • Gnupg
Gpg4win
  • Gpg4win
REFERENCES

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact