CVE-2005-1852
Published Jul 26, 2005
Last updated 7 years ago
Overview
- Description
- Multiple integer overflows in libgadu, as used in Kopete in KDE 3.2.3 to 3.4.1, ekg before 1.6rc3, GNU Gadu, CenterICQ, Kadu, and other packages, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an incoming message.
- Source
- security@debian.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-189
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ekg:ekg:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "13F32A39-4443-46C9-8E14-08AA59BC1CC2" }, { "criteria": "cpe:2.3:a:ekg:ekg:1.0_rc2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6531EE56-D685-4276-A911-E69C80F86561" }, { "criteria": "cpe:2.3:a:ekg:ekg:1.0_rc3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "28012535-7CAD-456E-86A5-649CF21E28F9" }, { "criteria": "cpe:2.3:a:ekg:ekg:1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "74A32270-8C65-4ED4-96CB-B389B97587A7" }, { "criteria": "cpe:2.3:a:ekg:ekg:1.1_rc1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B6A305C4-F461-429D-90F8-3FCC04D07635" }, { "criteria": "cpe:2.3:a:ekg:ekg:1.1_rc2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CF945FFF-C0D9-4C56-8B43-3ABE9530E939" }, { "criteria": "cpe:2.3:a:ekg:ekg:1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "17988E27-6C98-48B4-8779-4EF69E8DBD42" }, { "criteria": "cpe:2.3:a:ekg:ekg:1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "12FCB0EE-8BCE-4E68-B78D-A57E8E9DEC92" }, { "criteria": "cpe:2.3:a:ekg:ekg:1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D723B90C-9746-4F94-A8A3-273240A2CBCA" }, { "criteria": "cpe:2.3:a:ekg:ekg:1.5_rc1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6D2E4CA2-0024-4F4E-AB1C-328539E17451" }, { "criteria": "cpe:2.3:a:ekg:ekg:1.5_rc2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FAC21287-D631-4836-9945-9673A2BC9C7D" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D17407A2-089E-43A5-9BD5-EFF966F5CC16" }, { "criteria": "cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C4B436D-8D6A-473E-B707-26147208808B" }, { "criteria": "cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E26B353-4985-4116-B97A-5767CDC732F1" }, { "criteria": "cpe:2.3:o:kde:kde:3.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9F7180B3-03AC-427C-8CAD-FE06F81C4FF1" }, { "criteria": "cpe:2.3:o:kde:kde:3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "442021C9-BE4D-4BC9-8114-8BEFA9EC1232" }, { "criteria": "cpe:2.3:o:kde:kde:3.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D600E27F-A1D6-42C7-8ED1-FD508F5B3AB1" }, { "criteria": "cpe:2.3:o:kde:kde:3.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7036AE90-C7E0-48CE-805D-3F1E04852675" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:centericq:centericq:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "865F252C-CC39-47D8-BCFD-66E3E331E514" }, { "criteria": "cpe:2.3:a:kadu:kadu:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0215DF17-C015-41E1-91F0-9D216209105C" } ], "operator": "OR" } ] } ]