|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200507-26] GNU Gadu, CenterICQ, Kadu, EKG, libgadu: Remote code execution in Gadu library Vulnerability Assessment Details
|
[GLSA-200507-26] GNU Gadu, CenterICQ, Kadu, EKG, libgadu: Remote code execution in Gadu library |
||
GNU Gadu, CenterICQ, Kadu, EKG, libgadu: Remote code execution in Gadu library Detailed Explanation for this Vulnerability Assessment The remote host is affected by the vulnerability described in GLSA-200507-26 (GNU Gadu, CenterICQ, Kadu, EKG, libgadu: Remote code execution in Gadu library) GNU Gadu, CenterICQ, Kadu, EKG and libgadu are vulnerable to an integer overflow. Impact A remote attacker could exploit the integer overflow to execute arbitrary code or cause a Denial of Service. Workaround There is no known workaround at this time. References: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1852 http://www.securityfocus.com/archive/1/406026/30/ Solution: All GNU Gadu users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-im/gnugadu-2.2.6-r1" All Kadu users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-im/kadu-0.4.1" All EKG users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-im/ekg-1.6_rc3" All libgadu users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-libs/libgadu-20050719" All CenterICQ users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-im/centericq-4.20.0-r3" CenterICQ is no longer distributed with Gadu Gadu support, affected users are encouraged to migrate to an alternative package. Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: (C) 2005 Michel Arboi |
||
Cables, Connectors |
LSI 9207-8i 8-Port SAS Non-RAID 6GBPS PCIe Host Bus Adapter
$34.95
Oracle 7085209 LSI MegaRAID SAS 9361-8i 1GB Cache 12Gbps SAS/SATA PCIe RAID Card
$28.20
Cisco UCS LSI MegaRAID 9271CV-8I SAS2308 PCIe SAS Internal RAID Controller
$28.00
LSI 9223-8I 6GBPS PCIe SAS Internal RAID Controller
$22.75
Inspur LSI 9300-8i Raid Card 12Gbps HBA HDD Controller High Profile IT MODE
$15.98
LSI MegaRAID 9361-8i 12Gb PCIe 8-Port SAS/SATA RAID 1Gb w/BBU/CacheVault/License
$39.95
LSI MegaRAID 9361-8i 12Gbps PCIe 3 x8 SATA SAS 3 8 Port RAID + BBU & CacheVault
$39.00
ORICO Multi Bay RAID Hard Drive Enclosure USB 3.0/ Type-C For 2.5/3.5'' HDD SSDs
$82.49
ACASIS 2.5/3.5 inch 2 Bay SATA USB 3.0 Hard Drive Disk HDD SSD Enclosure 4 RAID
$58.99
Dell PERC H330 PCIe 3.0 x8 RAID Storage Controller 04Y5H1 High Profile
$17.99
|
||
No Discussions have been posted on this vulnerability. |