Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.55043
Kategorie:FreeBSD Local Security Checks
Titel:FreeBSD Ports: gaim, ja-gaim, ko-gaim, ru-gaim
Zusammenfassung:The remote host is missing an update to the system; as announced in the referenced advisory.
Beschreibung:Summary:
The remote host is missing an update to the system
as announced in the referenced advisory.

Vulnerability Insight:
The following packages are affected:

gaim, ja-gaim, ko-gaim, ru-gaim, kdenetwork, pl-ekg, centericq, pl-gnugadu

CVE-2005-1850
Certain contributed scripts for ekg Gadu Gadu client 1.5 and earlier
create temporary files insecurely, with unknown impact and attack
vectors, a different vulnerability than CVE-2005-1916.

CVE-2005-1851
A certain contributed script for ekg Gadu Gadu client 1.5 and earlier
allows attackers to execute shell commands via unknown attack vectors.

CVE-2005-1852
Multiple integer overflows in libgadu, as used in Kopete in KDE 3.2.3
to 3.4.1, ekg before 1.6rc3, and other packages, allows remote
attackers to cause a denial of service (crash) and possibly execute
arbitrary code via an incoming message.

CVE-2005-2369
Multiple integer signedness errors in libgadu, as used in ekg before
1.6rc2 and other packages, may allow remote attackers to cause a
denial of service or execute arbitrary code.

CVE-2005-2370
Multiple 'memory alignment errors' in libgadu, as used in ekg before
1.6rc2 and other packages, allows remote attackers to cause a denial
of service (bus error) on certain architectures such as SPARC via an
incoming message.

CVE-2005-2448
Multiple 'endianness errors' in libgadu in ekg before 1.6rc2 allow
remote attackers to cause a denial of service (invalid behaviour in
applications) on big-endian systems.

Solution:
Update your system with the appropriate patches or
software upgrades.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2005-1850
Bugtraq: 20050721 Multiple vulnerabilities in libgadu and ekg package (Google Search)
http://marc.info/?l=bugtraq&m=112198499417250&w=2
Debian Security Information: DSA-760 (Google Search)
http://www.debian.org/security/2005/dsa-760
Common Vulnerability Exposure (CVE) ID: CVE-2005-1851
Common Vulnerability Exposure (CVE) ID: CVE-2005-1852
BugTraq ID: 14345
http://www.securityfocus.com/bid/14345
http://lwn.net/Articles/144724/
http://security.gentoo.org/glsa/glsa-200507-23.xml
http://www.gentoo.org/security/en/glsa/glsa-200507-26.xml
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9532
http://www.redhat.com/support/errata/RHSA-2005-639.html
http://secunia.com/advisories/16140
http://secunia.com/advisories/16155
http://secunia.com/advisories/16211
http://secunia.com/advisories/16242
SuSE Security Announcement: SUSE-SR:2005:019 (Google Search)
http://www.novell.com/linux/security/advisories/2005_19_sr.html
Common Vulnerability Exposure (CVE) ID: CVE-2005-2369
BugTraq ID: 14415
http://www.securityfocus.com/bid/14415
Debian Security Information: DSA-813 (Google Search)
http://www.debian.org/security/2005/dsa-813
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10281
Common Vulnerability Exposure (CVE) ID: CVE-2005-2370
BugTraq ID: 24600
http://www.securityfocus.com/bid/24600
Debian Security Information: DSA-1318 (Google Search)
http://www.debian.org/security/2007/dsa-1318
http://www.securityfocus.com/archive/1/426078/100/0/threaded
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10456
http://www.redhat.com/support/errata/RHSA-2005-627.html
http://secunia.com/advisories/16265
Common Vulnerability Exposure (CVE) ID: CVE-2005-2448
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11263
http://secunia.com/advisories/16363
CopyrightCopyright (C) 2008 E-Soft Inc.

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.