Vulnerability Name: | CVE-2005-1852 (CCN-21490) | ||||||||||||||||||||
Assigned: | 2005-07-21 | ||||||||||||||||||||
Published: | 2005-07-21 | ||||||||||||||||||||
Updated: | 2017-10-11 | ||||||||||||||||||||
Summary: | Multiple integer overflows in libgadu, as used in Kopete in KDE 3.2.3 to 3.4.1, ekg before 1.6rc3, GNU Gadu, CenterICQ, Kadu, and other packages, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an incoming message. | ||||||||||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||
Vulnerability Type: | CWE-189 | ||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||
References: | Source: CCN Type: KDE FTP Web page KDE Source: MITRE Type: CNA CVE-2005-1852 Source: MITRE Type: CNA CVE-2005-2369 Source: MITRE Type: CNA CVE-2005-2370 Source: MITRE Type: CNA CVE-2005-2448 Source: CCN Type: EKG Download Web page eksperymentalny klient gadu-gadu Source: CCN Type: Conectiva Linux Security Announcement CLSA-2005:989 Fix for kopete security vulnerabi Source: CCN Type: Conectiva Linux Security Announcement CLSA-2005:1006 Fixes for gaim's vulnerabilities Source: FEDORA Type: Patch, Vendor Advisory FEDORA-2005-624 Source: BUGTRAQ Type: UNKNOWN 20050721 Multiple vulnerabilities in libgadu and ekg package Source: CCN Type: RHSA-2005-627 gaim security update Source: CCN Type: RHSA-2005-639 kdenetwork security update Source: CCN Type: SA16140 ekg libgadu Integer Overflow Vulnerability Source: SECUNIA Type: Vendor Advisory 16140 Source: SECUNIA Type: Vendor Advisory 16155 Source: SECUNIA Type: Vendor Advisory 16211 Source: SECUNIA Type: Vendor Advisory 16242 Source: CCN Type: SA16265 Gaim libgadu Memory Alignment Weakness Source: GENTOO Type: Patch, Vendor Advisory GLSA-200507-23 Source: CCN Type: CIAC INFORMATION BULLETIN P-270 GAIM Security Update Source: DEBIAN Type: DSA-1318 ekg -- several vulnerabilities Source: DEBIAN Type: DSA-767 ekg -- integer overflows Source: DEBIAN Type: DSA-769 gaim -- memory alignment bug Source: DEBIAN Type: DSA-813 centericq -- several vulnerabilities Source: CCN Type: GLSA-200507-23 Kopete: Vulnerability in included Gadu library Source: CCN Type: GLSA-200507-26 GNU Gadu, CenterICQ, Kadu, EKG, libgadu: Remote code execution in Gadu library Source: GENTOO Type: UNKNOWN GLSA-200507-26 Source: CCN Type: KDE Security Advisory 20050721-1 libgadu vulnerabilities Source: CONFIRM Type: Patch, Vendor Advisory http://www.kde.org/info/security/advisory-20050721-1.txt Source: SUSE Type: UNKNOWN SUSE-SR:2005:019 Source: CCN Type: OSVDB ID: 18125 libgadu Data Processing Multiple Signedness Errors Source: CCN Type: OSVDB ID: 18127 libgadu on Big-Endian Architecture Unspecified Issue Source: REDHAT Type: UNKNOWN RHSA-2005:639 Source: BID Type: Patch 14345 Source: CCN Type: BID-14345 EKG LIbGadu Multiple Remote Integer Overflow Vulnerabilities Source: CCN Type: BID-14415 EKG Libgadu Multiple Memory Alignment Remote Denial of Service Vulnerabilities Source: CCN Type: BID-24600 EKG Multiple Remote Denial of Service Vulnerabilities Source: CCN Type: USN-162-1 ekg and Gadu library vulnerabilities Source: CCN Type: USN-168-1 Gaim vulnerabilities Source: XF Type: UNKNOWN ekg-libgadu-integer-bo(21490) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:9532 Source: SUSE Type: SUSE-SR:2005:019 SUSE Security Summary Report | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration RedHat 1: Denotes that component is vulnerable | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |