Vulnerability Name: | CVE-2005-2370 (CCN-21490) | ||||||||||||||||||||||||||||||||
Assigned: | 2005-07-21 | ||||||||||||||||||||||||||||||||
Published: | 2005-07-21 | ||||||||||||||||||||||||||||||||
Updated: | 2018-10-19 | ||||||||||||||||||||||||||||||||
Summary: | Multiple "memory alignment errors" in libgadu, as used in ekg before 1.6rc2, Gaim before 1.5.0, and other packages, allows remote attackers to cause a denial of service (bus error) on certain architectures such as SPARC via an incoming message. | ||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-399 | ||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||
References: | Source: CCN Type: KDE FTP Web page KDE Source: MITRE Type: CNA CVE-2005-1852 Source: MITRE Type: CNA CVE-2005-2369 Source: MITRE Type: CNA CVE-2005-2370 Source: MITRE Type: CNA CVE-2005-2448 Source: CCN Type: EKG Download Web page eksperymentalny klient gadu-gadu Source: CCN Type: Conectiva Linux Security Announcement CLSA-2005:989 Fix for kopete security vulnerabi Source: CCN Type: Conectiva Linux Security Announcement CLSA-2005:1006 Fixes for gaim's vulnerabilities Source: CONFIRM Type: UNKNOWN http://gaim.sourceforge.net/security/index.php?id=20 Source: BUGTRAQ Type: UNKNOWN 20050721 Multiple vulnerabilities in libgadu and ekg package Source: CCN Type: RHSA-2005-627 gaim security update Source: CCN Type: RHSA-2005-639 kdenetwork security update Source: CCN Type: SA16140 ekg libgadu Integer Overflow Vulnerability Source: CCN Type: SA16265 Gaim libgadu Memory Alignment Weakness Source: SECUNIA Type: Vendor Advisory 16265 Source: CCN Type: CIAC INFORMATION BULLETIN P-270 GAIM Security Update Source: DEBIAN Type: UNKNOWN DSA-813 Source: DEBIAN Type: UNKNOWN DSA-1318 Source: DEBIAN Type: DSA-1318 ekg -- several vulnerabilities Source: DEBIAN Type: DSA-767 ekg -- integer overflows Source: DEBIAN Type: DSA-769 gaim -- memory alignment bug Source: DEBIAN Type: DSA-813 centericq -- several vulnerabilities Source: CCN Type: GLSA-200507-23 Kopete: Vulnerability in included Gadu library Source: CCN Type: GLSA-200507-26 GNU Gadu, CenterICQ, Kadu, EKG, libgadu: Remote code execution in Gadu library Source: CCN Type: KDE Security Advisory 20050721-1 libgadu vulnerabilities Source: CCN Type: OSVDB ID: 18125 libgadu Data Processing Multiple Signedness Errors Source: CCN Type: OSVDB ID: 18127 libgadu on Big-Endian Architecture Unspecified Issue Source: REDHAT Type: UNKNOWN RHSA-2005:627 Source: FEDORA Type: UNKNOWN FLSA:158543 Source: CCN Type: BID-14345 EKG LIbGadu Multiple Remote Integer Overflow Vulnerabilities Source: CCN Type: BID-14415 EKG Libgadu Multiple Memory Alignment Remote Denial of Service Vulnerabilities Source: BID Type: UNKNOWN 24600 Source: CCN Type: BID-24600 EKG Multiple Remote Denial of Service Vulnerabilities Source: CCN Type: USN-162-1 ekg and Gadu library vulnerabilities Source: CCN Type: USN-168-1 Gaim vulnerabilities Source: XF Type: UNKNOWN ekg-libgadu-integer-bo(21490) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:10456 Source: SUSE Type: SUSE-SR:2005:019 SUSE Security Summary Report | ||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
BACK |