source: http://www.securityfocus.com/bid/2797/info GnuPG is a popular open source public/private key encryption system. It is possible for attackers to create an encrypted document that will exploit a format string vulnerability in the GnuPG client when the document is decrypted. This vulnerability may lead to remote attackers gaining access to client hosts. https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20889.tar.gz