GnuPG.org has released versions 1.4.6 and 2.0.1 of GPG, the popular free PGP replacement to address the vulnerabilities noted in CVE-2006-6235, a code execution vulnerability triggered by a malformed message/file. You are urged to upgrade as soon as possible.
GPG home: http://www.gnupg.org I will be teaching next: Malware Reverse-Engineering Challenge - Community SANS Seattle FOR610
Dec 6th 2006
1 decade ago