Vulnerability Name:

CVE-2005-1850 (CCN-23633)

Assigned:2005-07-18
Published:2005-07-18
Updated:2016-10-18
Summary:Certain contributed scripts for ekg Gadu Gadu client 1.5 and earlier create temporary files insecurely, with unknown impact and attack vectors, a different vulnerability than CVE-2005-1916.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Other
References:Source: MITRE
Type: CNA
CVE-2005-1850

Source: CCN
Type: Eksperymentalny Klient Gadu-Gadu Web page
eksperymentalny klient gadu-gadu

Source: BUGTRAQ
Type: UNKNOWN
20050721 Multiple vulnerabilities in libgadu and ekg package

Source: DEBIAN
Type: Patch, Vendor Advisory
DSA-760

Source: CCN
Type: USN-162-1
ekg and Gadu library vulnerabilities

Source: XF
Type: UNKNOWN
ekg-temp-insecure-files(23633)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:ekg:ekg:1.0:*:*:*:*:*:*:*
  • OR cpe:/a:ekg:ekg:1.0_rc2:*:*:*:*:*:*:*
  • OR cpe:/a:ekg:ekg:1.0_rc3:*:*:*:*:*:*:*
  • OR cpe:/a:ekg:ekg:1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ekg:ekg:1.1_rc1:*:*:*:*:*:*:*
  • OR cpe:/a:ekg:ekg:1.1_rc2:*:*:*:*:*:*:*
  • OR cpe:/a:ekg:ekg:1.3:*:*:*:*:*:*:*
  • OR cpe:/a:ekg:ekg:1.4:*:*:*:*:*:*:*
  • OR cpe:/a:ekg:ekg:1.5:*:*:*:*:*:*:*
  • OR cpe:/a:ekg:ekg:1.5_rc1:*:*:*:*:*:*:*
  • OR cpe:/a:ekg:ekg:1.5_rc2:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.debian:def:760
    V
    several vulnerabilities
    2005-07-18
    BACK
    ekg ekg 1.0
    ekg ekg 1.0_rc2
    ekg ekg 1.0_rc3
    ekg ekg 1.1
    ekg ekg 1.1_rc1
    ekg ekg 1.1_rc2
    ekg ekg 1.3
    ekg ekg 1.4
    ekg ekg 1.5
    ekg ekg 1.5_rc1
    ekg ekg 1.5_rc2