Multiple integer overflows in libgadu, as used in Kopete in KDE 3.2.3 to 3.4.1, ekg before 1.6rc3, GNU Gadu, CenterICQ, Kadu, and other packages, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an incoming message.
Weaknesses in this category are related to improper calculation or conversion of numbers.
Link | Tags |
---|---|
http://www.kde.org/info/security/advisory-20050721-1.txt | patch vendor advisory |
http://secunia.com/advisories/16140 | third party advisory vendor advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9532 | vdb entry signature |
http://www.gentoo.org/security/en/glsa/glsa-200507-26.xml | vendor advisory |
http://www.securityfocus.com/bid/14345 | vdb entry patch |
http://secunia.com/advisories/16242 | third party advisory vendor advisory |
http://security.gentoo.org/glsa/glsa-200507-23.xml | patch vendor advisory |
http://www.novell.com/linux/security/advisories/2005_19_sr.html | vendor advisory |
http://marc.info/?l=bugtraq&m=112198499417250&w=2 | mailing list |
http://www.redhat.com/support/errata/RHSA-2005-639.html | vendor advisory |
http://lwn.net/Articles/144724/ | patch vendor advisory |
http://secunia.com/advisories/16211 | third party advisory vendor advisory |
http://secunia.com/advisories/16155 | third party advisory vendor advisory |