CVE-2005-1852
 
Severity Score
7.5
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Multiple integer overflows in libgadu, as used in Kopete in KDE 3.2.3 to 3.4.1, ekg before 1.6rc3, GNU Gadu, CenterICQ, Kadu, and other packages, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an incoming message.
Múltiples desbordamientos de búfer en libgadu, usado en Kopete en KDE 3.2.3 hasta la 3.4.1, ekg anteriores a 1.6rc3, GNU Gadu, CenterICQ, Kadu, y otros paquetes, permite que atacantes remotos causen una denegación de servicio (caída) y posiblemente ejecuten código arbitrario mediante un mensaje de entrada.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2005-06-06 CVE Reserved
- 2005-07-22 CVE Published
- 2024-07-02 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-189: Numeric Errors
CAPEC
References (15)
URL | Tag | Source |
---|---|---|
http://marc.info/?l=bugtraq&m=112198499417250&w=2 | Mailing List | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9532 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lwn.net/Articles/144724 | 2017-10-11 | |
http://security.gentoo.org/glsa/glsa-200507-23.xml | 2017-10-11 | |
http://www.kde.org/info/security/advisory-20050721-1.txt | 2017-10-11 | |
http://www.securityfocus.com/bid/14345 | 2017-10-11 |
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/16140 | 2017-10-11 | |
http://secunia.com/advisories/16155 | 2017-10-11 | |
http://secunia.com/advisories/16211 | 2017-10-11 | |
http://secunia.com/advisories/16242 | 2017-10-11 | |
http://www.gentoo.org/security/en/glsa/glsa-200507-26.xml | 2017-10-11 | |
http://www.novell.com/linux/security/advisories/2005_19_sr.html | 2017-10-11 | |
http://www.redhat.com/support/errata/RHSA-2005-639.html | 2017-10-11 | |
https://access.redhat.com/security/cve/CVE-2005-1852 | 2005-07-22 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1617674 | 2005-07-22 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ekg Search vendor "Ekg" | Ekg Search vendor "Ekg" for product "Ekg" | 1.0 Search vendor "Ekg" for product "Ekg" and version "1.0" | - |
Affected
| ||||||
Ekg Search vendor "Ekg" | Ekg Search vendor "Ekg" for product "Ekg" | 1.0_rc2 Search vendor "Ekg" for product "Ekg" and version "1.0_rc2" | - |
Affected
| ||||||
Ekg Search vendor "Ekg" | Ekg Search vendor "Ekg" for product "Ekg" | 1.0_rc3 Search vendor "Ekg" for product "Ekg" and version "1.0_rc3" | - |
Affected
| ||||||
Ekg Search vendor "Ekg" | Ekg Search vendor "Ekg" for product "Ekg" | 1.1 Search vendor "Ekg" for product "Ekg" and version "1.1" | - |
Affected
| ||||||
Ekg Search vendor "Ekg" | Ekg Search vendor "Ekg" for product "Ekg" | 1.1_rc1 Search vendor "Ekg" for product "Ekg" and version "1.1_rc1" | - |
Affected
| ||||||
Ekg Search vendor "Ekg" | Ekg Search vendor "Ekg" for product "Ekg" | 1.1_rc2 Search vendor "Ekg" for product "Ekg" and version "1.1_rc2" | - |
Affected
| ||||||
Ekg Search vendor "Ekg" | Ekg Search vendor "Ekg" for product "Ekg" | 1.3 Search vendor "Ekg" for product "Ekg" and version "1.3" | - |
Affected
| ||||||
Ekg Search vendor "Ekg" | Ekg Search vendor "Ekg" for product "Ekg" | 1.4 Search vendor "Ekg" for product "Ekg" and version "1.4" | - |
Affected
| ||||||
Ekg Search vendor "Ekg" | Ekg Search vendor "Ekg" for product "Ekg" | 1.5 Search vendor "Ekg" for product "Ekg" and version "1.5" | - |
Affected
| ||||||
Ekg Search vendor "Ekg" | Ekg Search vendor "Ekg" for product "Ekg" | 1.5_rc1 Search vendor "Ekg" for product "Ekg" and version "1.5_rc1" | - |
Affected
| ||||||
Ekg Search vendor "Ekg" | Ekg Search vendor "Ekg" for product "Ekg" | 1.5_rc2 Search vendor "Ekg" for product "Ekg" and version "1.5_rc2" | - |
Affected
| ||||||
Kde Search vendor "Kde" | Kde Search vendor "Kde" for product "Kde" | 3.2.3 Search vendor "Kde" for product "Kde" and version "3.2.3" | - |
Affected
| ||||||
Kde Search vendor "Kde" | Kde Search vendor "Kde" for product "Kde" | 3.3 Search vendor "Kde" for product "Kde" and version "3.3" | - |
Affected
| ||||||
Kde Search vendor "Kde" | Kde Search vendor "Kde" for product "Kde" | 3.3.1 Search vendor "Kde" for product "Kde" and version "3.3.1" | - |
Affected
| ||||||
Kde Search vendor "Kde" | Kde Search vendor "Kde" for product "Kde" | 3.3.2 Search vendor "Kde" for product "Kde" and version "3.3.2" | - |
Affected
| ||||||
Kde Search vendor "Kde" | Kde Search vendor "Kde" for product "Kde" | 3.4 Search vendor "Kde" for product "Kde" and version "3.4" | - |
Affected
| ||||||
Kde Search vendor "Kde" | Kde Search vendor "Kde" for product "Kde" | 3.4.0 Search vendor "Kde" for product "Kde" and version "3.4.0" | - |
Affected
| ||||||
Kde Search vendor "Kde" | Kde Search vendor "Kde" for product "Kde" | 3.4.1 Search vendor "Kde" for product "Kde" and version "3.4.1" | - |
Affected
| ||||||
Centericq Search vendor "Centericq" | Centericq Search vendor "Centericq" for product "Centericq" | * | - |
Affected
| ||||||
Kadu Search vendor "Kadu" | Kadu Search vendor "Kadu" for product "Kadu" | * | - |
Affected
|