CVE-2005-1852
Gentoo Linux Security Advisory 200507-26
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Multiple integer overflows in libgadu, as used in Kopete in KDE 3.2.3 to 3.4.1, ekg before 1.6rc3, GNU Gadu, CenterICQ, Kadu, and other packages, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an incoming message.
Múltiples desbordamientos de búfer en libgadu, usado en Kopete en KDE 3.2.3 hasta la 3.4.1, ekg anteriores a 1.6rc3, GNU Gadu, CenterICQ, Kadu, y otros paquetes, permite que atacantes remotos causen una denegación de servicio (caída) y posiblemente ejecuten código arbitrario mediante un mensaje de entrada.
KDE Security Advisory: Kopete contains a copy of libgadu that is used if no compatible version is installed in the system. Several input validation errors have been reported in libgadu that can lead to integer overflows and remote DoS or arbitrary code execution. All versions of Kopete as included in KDE 3.3.x up to including 3.4.1 are affected. KDE 3.2.x and older are not affected.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2005-06-06 CVE Reserved
- 2005-07-22 CVE Published
- 2024-08-07 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-189: Numeric Errors
CAPEC
References (15)
URL | Tag | Source |
---|---|---|
http://marc.info/?l=bugtraq&m=112198499417250&w=2 | Mailing List | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9532 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lwn.net/Articles/144724 | 2017-10-11 | |
http://security.gentoo.org/glsa/glsa-200507-23.xml | 2017-10-11 | |
http://www.kde.org/info/security/advisory-20050721-1.txt | 2017-10-11 | |
http://www.securityfocus.com/bid/14345 | 2017-10-11 |
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/16140 | 2017-10-11 | |
http://secunia.com/advisories/16155 | 2017-10-11 | |
http://secunia.com/advisories/16211 | 2017-10-11 | |
http://secunia.com/advisories/16242 | 2017-10-11 | |
http://www.gentoo.org/security/en/glsa/glsa-200507-26.xml | 2017-10-11 | |
http://www.novell.com/linux/security/advisories/2005_19_sr.html | 2017-10-11 | |
http://www.redhat.com/support/errata/RHSA-2005-639.html | 2017-10-11 | |
https://access.redhat.com/security/cve/CVE-2005-1852 | 2005-07-22 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1617674 | 2005-07-22 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ekg Search vendor "Ekg" | Ekg Search vendor "Ekg" for product "Ekg" | 1.0 Search vendor "Ekg" for product "Ekg" and version "1.0" | - |
Affected
| ||||||
Ekg Search vendor "Ekg" | Ekg Search vendor "Ekg" for product "Ekg" | 1.0_rc2 Search vendor "Ekg" for product "Ekg" and version "1.0_rc2" | - |
Affected
| ||||||
Ekg Search vendor "Ekg" | Ekg Search vendor "Ekg" for product "Ekg" | 1.0_rc3 Search vendor "Ekg" for product "Ekg" and version "1.0_rc3" | - |
Affected
| ||||||
Ekg Search vendor "Ekg" | Ekg Search vendor "Ekg" for product "Ekg" | 1.1 Search vendor "Ekg" for product "Ekg" and version "1.1" | - |
Affected
| ||||||
Ekg Search vendor "Ekg" | Ekg Search vendor "Ekg" for product "Ekg" | 1.1_rc1 Search vendor "Ekg" for product "Ekg" and version "1.1_rc1" | - |
Affected
| ||||||
Ekg Search vendor "Ekg" | Ekg Search vendor "Ekg" for product "Ekg" | 1.1_rc2 Search vendor "Ekg" for product "Ekg" and version "1.1_rc2" | - |
Affected
| ||||||
Ekg Search vendor "Ekg" | Ekg Search vendor "Ekg" for product "Ekg" | 1.3 Search vendor "Ekg" for product "Ekg" and version "1.3" | - |
Affected
| ||||||
Ekg Search vendor "Ekg" | Ekg Search vendor "Ekg" for product "Ekg" | 1.4 Search vendor "Ekg" for product "Ekg" and version "1.4" | - |
Affected
| ||||||
Ekg Search vendor "Ekg" | Ekg Search vendor "Ekg" for product "Ekg" | 1.5 Search vendor "Ekg" for product "Ekg" and version "1.5" | - |
Affected
| ||||||
Ekg Search vendor "Ekg" | Ekg Search vendor "Ekg" for product "Ekg" | 1.5_rc1 Search vendor "Ekg" for product "Ekg" and version "1.5_rc1" | - |
Affected
| ||||||
Ekg Search vendor "Ekg" | Ekg Search vendor "Ekg" for product "Ekg" | 1.5_rc2 Search vendor "Ekg" for product "Ekg" and version "1.5_rc2" | - |
Affected
| ||||||
Kde Search vendor "Kde" | Kde Search vendor "Kde" for product "Kde" | 3.2.3 Search vendor "Kde" for product "Kde" and version "3.2.3" | - |
Affected
| ||||||
Kde Search vendor "Kde" | Kde Search vendor "Kde" for product "Kde" | 3.3 Search vendor "Kde" for product "Kde" and version "3.3" | - |
Affected
| ||||||
Kde Search vendor "Kde" | Kde Search vendor "Kde" for product "Kde" | 3.3.1 Search vendor "Kde" for product "Kde" and version "3.3.1" | - |
Affected
| ||||||
Kde Search vendor "Kde" | Kde Search vendor "Kde" for product "Kde" | 3.3.2 Search vendor "Kde" for product "Kde" and version "3.3.2" | - |
Affected
| ||||||
Kde Search vendor "Kde" | Kde Search vendor "Kde" for product "Kde" | 3.4 Search vendor "Kde" for product "Kde" and version "3.4" | - |
Affected
| ||||||
Kde Search vendor "Kde" | Kde Search vendor "Kde" for product "Kde" | 3.4.0 Search vendor "Kde" for product "Kde" and version "3.4.0" | - |
Affected
| ||||||
Kde Search vendor "Kde" | Kde Search vendor "Kde" for product "Kde" | 3.4.1 Search vendor "Kde" for product "Kde" and version "3.4.1" | - |
Affected
| ||||||
Centericq Search vendor "Centericq" | Centericq Search vendor "Centericq" for product "Centericq" | * | - |
Affected
| ||||||
Kadu Search vendor "Kadu" | Kadu Search vendor "Kadu" for product "Kadu" | * | - |
Affected
|