All the vulnerabilites related to ekiga - ekiga
Vulnerability from fkie_nvd
Published
2007-09-14 18:17
Modified
2024-11-21 00:36
Severity ?
Summary
pwlib, as used by Ekiga 2.0.5 and possibly other products, allows remote attackers to cause a denial of service (application crash) via a long argument to the PString::vsprintf function, related to a "memory management flaw". NOTE: this issue was originally reported as being in the SIPURL::GetHostAddress function in Ekiga (formerly GnomeMeeting).
References
cve@mitre.orghttp://blog.s21sec.com/2007/09/sobre-la-vulnerabilidad-del-ekiga.html
cve@mitre.orghttp://marc.info/?l=full-disclosure&m=118959114522339&w=2
cve@mitre.orghttp://openh323.cvs.sourceforge.net/openh323/opal/src/sip/sipcon.cxx?r1=2.120.2.25&r2=2.120.2.26&pathrev=v2_2_9
cve@mitre.orghttp://secunia.com/advisories/27127Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/27150Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/27518Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/28385Vendor Advisory
cve@mitre.orghttp://securityreason.com/securityalert/3138
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2007:206
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2007-0932.html
cve@mitre.orghttp://www.s21sec.com/avisos/s21sec-036-en.txt
cve@mitre.orghttp://www.securityfocus.com/archive/1/479185/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/25642
cve@mitre.orghttp://www.securitytracker.com/id?1018683
cve@mitre.orghttp://www.ubuntu.com/usn/usn-561-1
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=292831
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/36568
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10928
af854a3a-2127-422b-91ae-364da2661108http://blog.s21sec.com/2007/09/sobre-la-vulnerabilidad-del-ekiga.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=full-disclosure&m=118959114522339&w=2
af854a3a-2127-422b-91ae-364da2661108http://openh323.cvs.sourceforge.net/openh323/opal/src/sip/sipcon.cxx?r1=2.120.2.25&r2=2.120.2.26&pathrev=v2_2_9
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27127Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27150Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27518Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28385Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/3138
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:206
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0932.html
af854a3a-2127-422b-91ae-364da2661108http://www.s21sec.com/avisos/s21sec-036-en.txt
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/479185/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/25642
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1018683
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-561-1
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=292831
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/36568
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10928
Impacted products
Vendor Product Version
ekiga ekiga 2.0.5



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ekiga:ekiga:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B22A5AD1-0410-4EF1-A826-DCBE1859EFDB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "pwlib, as used by Ekiga 2.0.5 and possibly other products, allows remote attackers to cause a denial of service (application crash) via a long argument to the PString::vsprintf function, related to a \"memory management flaw\". NOTE: this issue was originally reported as being in the SIPURL::GetHostAddress function in Ekiga (formerly GnomeMeeting)."
    },
    {
      "lang": "es",
      "value": "pwlib, tal y como es usada por Ekiga versi\u00f3n 2.0.5 y posiblemente otros productos, permite a atacantes remotos causar una denegaci\u00f3n de servicio (bloqueo de aplicaci\u00f3n) por medio de un argumento largo en la funci\u00f3n PString::vsprintf, relacionado con un \"memory management flaw\". NOTA: este problema se report\u00f3 originalmente como estando en la funci\u00f3n SIPURL::GetHostAddress en Ekiga (anteriormente GnomeMeeting)."
    }
  ],
  "id": "CVE-2007-4897",
  "lastModified": "2024-11-21T00:36:39.987",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-09-14T18:17:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://blog.s21sec.com/2007/09/sobre-la-vulnerabilidad-del-ekiga.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=full-disclosure\u0026m=118959114522339\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://openh323.cvs.sourceforge.net/openh323/opal/src/sip/sipcon.cxx?r1=2.120.2.25\u0026r2=2.120.2.26\u0026pathrev=v2_2_9"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27127"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27150"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27518"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28385"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/3138"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:206"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0932.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.s21sec.com/avisos/s21sec-036-en.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/479185/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/25642"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1018683"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/usn-561-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=292831"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36568"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10928"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://blog.s21sec.com/2007/09/sobre-la-vulnerabilidad-del-ekiga.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=full-disclosure\u0026m=118959114522339\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openh323.cvs.sourceforge.net/openh323/opal/src/sip/sipcon.cxx?r1=2.120.2.25\u0026r2=2.120.2.26\u0026pathrev=v2_2_9"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27127"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27150"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27518"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28385"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/3138"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:206"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0932.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.s21sec.com/avisos/s21sec-036-en.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/479185/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/25642"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1018683"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-561-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=292831"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36568"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10928"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-10-08 21:17
Modified
2024-11-21 00:36
Severity ?
Summary
The Open Phone Abstraction Library (opal), as used by (1) Ekiga before 2.0.10 and (2) OpenH323 before 2.2.4, allows remote attackers to cause a denial of service (crash) via an invalid Content-Length header field in Session Initiation Protocol (SIP) packets, which causes a \0 byte to be written to an "attacker-controlled address."
References
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html
cve@mitre.orghttp://mail.gnome.org/archives/ekiga-list/2007-September/msg00103.htmlPatch
cve@mitre.orghttp://openh323.cvs.sourceforge.net/openh323/opal/src/sip/sippdu.cxx?r1=2.83.2.19&r2=2.83.2.20
cve@mitre.orghttp://osvdb.org/41637
cve@mitre.orghttp://secunia.com/advisories/27118Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/27128Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/27129Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/27271
cve@mitre.orghttp://secunia.com/advisories/27524
cve@mitre.orghttp://secunia.com/advisories/28380
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2007:205
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2007-0957.htmlPatch
cve@mitre.orghttp://www.s21sec.com/avisos/s21sec-037-en.txt
cve@mitre.orghttp://www.securityfocus.com/archive/1/482120/30/4500/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/25955
cve@mitre.orghttp://www.securitytracker.com/id?1018776
cve@mitre.orghttp://www.ubuntu.com/usn/usn-562-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/3413
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/3414
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=296371
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11398
cve@mitre.orghttps://www.exploit-db.com/exploits/9240
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html
af854a3a-2127-422b-91ae-364da2661108http://mail.gnome.org/archives/ekiga-list/2007-September/msg00103.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://openh323.cvs.sourceforge.net/openh323/opal/src/sip/sippdu.cxx?r1=2.83.2.19&r2=2.83.2.20
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/41637
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27118Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27128Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27129Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27271
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27524
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28380
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:205
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0957.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://www.s21sec.com/avisos/s21sec-037-en.txt
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/482120/30/4500/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/25955
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1018776
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-562-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/3413
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/3414
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=296371
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11398
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/9240
Impacted products
Vendor Product Version
ekiga ekiga *
openh323_project openh323 *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ekiga:ekiga:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AA58E06-4F99-41F5-82C4-596B9086E34C",
              "versionEndIncluding": "2.0.9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openh323_project:openh323:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9000792-2E73-4D72-8032-259266E91722",
              "versionEndIncluding": "2.2.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Open Phone Abstraction Library (opal), as used by (1) Ekiga before 2.0.10 and (2) OpenH323 before 2.2.4, allows remote attackers to cause a denial of service (crash) via an invalid Content-Length header field in Session Initiation Protocol (SIP) packets, which causes a \\0 byte to be written to an \"attacker-controlled address.\""
    },
    {
      "lang": "es",
      "value": "Open Phone Abstraction Library (opal), como la usada en (1) Ekiga anterior a 2.0.10 y (2) OpenH323 anterior a 2.2.4, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) mediante una cabecera Content-Length inv\u00e1lida en paquetes SIP del Protocolo de Inicio de Sesi\u00f3n (SIP, Session Initiation Protocol), lo cual provoca que el byte \\0 sea escrito en una \"direcci\u00f3n controlada por el atacante\"."
    }
  ],
  "id": "CVE-2007-4924",
  "lastModified": "2024-11-21T00:36:43.977",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-10-08T21:17:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://mail.gnome.org/archives/ekiga-list/2007-September/msg00103.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://openh323.cvs.sourceforge.net/openh323/opal/src/sip/sippdu.cxx?r1=2.83.2.19\u0026r2=2.83.2.20"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/41637"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27118"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27128"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27129"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/27271"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/27524"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/28380"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:205"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0957.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.s21sec.com/avisos/s21sec-037-en.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/482120/30/4500/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/25955"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1018776"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/usn-562-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/3413"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/3414"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=296371"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11398"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/9240"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://mail.gnome.org/archives/ekiga-list/2007-September/msg00103.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openh323.cvs.sourceforge.net/openh323/opal/src/sip/sippdu.cxx?r1=2.83.2.19\u0026r2=2.83.2.20"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/41637"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27118"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27128"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27129"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/27271"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/27524"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28380"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:205"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0957.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.s21sec.com/avisos/s21sec-037-en.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/482120/30/4500/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/25955"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1018776"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-562-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/3413"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/3414"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=296371"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11398"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/9240"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-02-20 17:28
Modified
2024-11-21 00:27
Severity ?
Summary
Format string vulnerability in GnomeMeeting 1.0.2 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format strings in the name, which is not properly handled in a call to the gnomemeeting_log_insert function.
References
secalert@redhat.comftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc
secalert@redhat.comhttp://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=229266
secalert@redhat.comhttp://osvdb.org/32083
secalert@redhat.comhttp://secunia.com/advisories/24185Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/24271
secalert@redhat.comhttp://secunia.com/advisories/24284
secalert@redhat.comhttp://secunia.com/advisories/24379
secalert@redhat.comhttp://secunia.com/advisories/25119
secalert@redhat.comhttp://www.debian.org/security/2007/dsa-1262
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:045
secalert@redhat.comhttp://www.novell.com/linux/security/advisories/2007_9_sr.html
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2007-0086.htmlPatch, Vendor Advisory
secalert@redhat.comhttp://www.ubuntu.com/usn/usn-426-1
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11776
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc
af854a3a-2127-422b-91ae-364da2661108http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=229266
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/32083
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24185Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24271
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24284
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24379
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25119
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2007/dsa-1262
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:045
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_9_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0086.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-426-1
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11776



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ekiga:ekiga:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D4077D8-9DF3-4177-B0F7-DD8B1BB9DB46",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*",
              "matchCriteriaId": "81B543F9-C209-46C2-B0AE-E14818A6992E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*",
              "matchCriteriaId": "EC79FF22-2664-4C40-B0B3-6D23B5F45162",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*",
              "matchCriteriaId": "DB89C970-DE94-4E09-A90A-077DB83AD156",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*",
              "matchCriteriaId": "F9440B25-D206-4914-9557-B5F030890DEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*",
              "matchCriteriaId": "E9933557-3BCA-4D92-AD4F-27758A0D3347",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*",
              "matchCriteriaId": "10A60552-15A5-4E95-B3CE-99A4B26260C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D74A418-50F0-42C0-ABBC-BBBE718FF025",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Format string vulnerability in GnomeMeeting 1.0.2 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format strings in the name, which is not properly handled in a call to the gnomemeeting_log_insert function."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de cadena de formato en GnomeMeeting 1.0.2 y anteriores permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante cadenas de formato en el nombre, que no es tratado adecuadamente en una llamada a la funci\u00f3n gnomemeeting_log_insert."
    }
  ],
  "evaluatorComment": "The product \"GnomeMeeting\" is now called \"Ekiga\".",
  "evaluatorImpact": "Failed exploit attempts will like result in a system level denial-of-service condition.",
  "id": "CVE-2007-1007",
  "lastModified": "2024-11-21T00:27:16.960",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-02-20T17:28:00.000",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=229266"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://osvdb.org/32083"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24185"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/24271"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/24284"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/24379"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/25119"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2007/dsa-1262"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:045"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.novell.com/linux/security/advisories/2007_9_sr.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0086.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/usn-426-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11776"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=229266"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/32083"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24185"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24271"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24284"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24379"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25119"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2007/dsa-1262"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:045"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2007_9_sr.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0086.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-426-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11776"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-02-20 01:28
Modified
2024-11-21 00:27
Severity ?
Summary
Multiple format string vulnerabilities in the gm_main_window_flash_message function in Ekiga before 2.0.5 allow attackers to cause a denial of service and possibly execute arbitrary code via a crafted Q.931 SETUP packet.
References
secalert@redhat.comhttp://fedoranews.org/cms/node/2682
secalert@redhat.comhttp://fedoranews.org/cms/node/2683
secalert@redhat.comhttp://labs.musecurity.com/advisories/MU-200702-01.txt
secalert@redhat.comhttp://mail.gnome.org/archives/ekiga-list/2007-February/msg00060.html
secalert@redhat.comhttp://secunia.com/advisories/24194Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/24228Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/24229Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/24271Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/24379Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/24680Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/25119Vendor Advisory
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-200703-25.xml
secalert@redhat.comhttp://www.debian.org/security/2007/dsa-1262
secalert@redhat.comhttp://www.ekiga.org/index.php?rub=10&archive=1
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:044
secalert@redhat.comhttp://www.novell.com/linux/security/advisories/2007_9_sr.html
secalert@redhat.comhttp://www.osvdb.org/31939
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2007-0087.html
secalert@redhat.comhttp://www.securityfocus.com/bid/22613
secalert@redhat.comhttp://www.securitytracker.com/id?1017673
secalert@redhat.comhttp://www.ubuntu.com/usn/usn-426-1
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/0655Vendor Advisory
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11642
af854a3a-2127-422b-91ae-364da2661108http://fedoranews.org/cms/node/2682
af854a3a-2127-422b-91ae-364da2661108http://fedoranews.org/cms/node/2683
af854a3a-2127-422b-91ae-364da2661108http://labs.musecurity.com/advisories/MU-200702-01.txt
af854a3a-2127-422b-91ae-364da2661108http://mail.gnome.org/archives/ekiga-list/2007-February/msg00060.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24194Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24228Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24229Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24271Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24379Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24680Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25119Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200703-25.xml
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2007/dsa-1262
af854a3a-2127-422b-91ae-364da2661108http://www.ekiga.org/index.php?rub=10&archive=1
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:044
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_9_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/31939
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0087.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/22613
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1017673
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-426-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/0655Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11642
Impacted products
Vendor Product Version
ekiga ekiga *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ekiga:ekiga:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "19574546-B159-4110-B167-80D713BDA1B6",
              "versionEndIncluding": "2.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple format string vulnerabilities in the gm_main_window_flash_message function in Ekiga before 2.0.5 allow attackers to cause a denial of service and possibly execute arbitrary code via a crafted Q.931 SETUP packet."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de cadena de formato en la funci\u00f3n gm_main_window_flash_message en Ekiga versiones anteriores a 2.0.5, permiten a atacantes causar una denegaci\u00f3n de servicio y posiblemente ejecutar c\u00f3digo arbitrario por medio de un paquete SETUP Q.931 especialmente dise\u00f1ado."
    }
  ],
  "evaluatorSolution": "Update to version 2.0.5.",
  "id": "CVE-2007-1006",
  "lastModified": "2024-11-21T00:27:16.820",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-02-20T01:28:00.000",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://fedoranews.org/cms/node/2682"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://fedoranews.org/cms/node/2683"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://labs.musecurity.com/advisories/MU-200702-01.txt"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://mail.gnome.org/archives/ekiga-list/2007-February/msg00060.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24194"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24228"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24229"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24271"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24379"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24680"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25119"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://security.gentoo.org/glsa/glsa-200703-25.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2007/dsa-1262"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ekiga.org/index.php?rub=10\u0026archive=1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:044"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.novell.com/linux/security/advisories/2007_9_sr.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.osvdb.org/31939"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0087.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/22613"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id?1017673"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/usn-426-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/0655"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11642"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://fedoranews.org/cms/node/2682"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://fedoranews.org/cms/node/2683"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://labs.musecurity.com/advisories/MU-200702-01.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://mail.gnome.org/archives/ekiga-list/2007-February/msg00060.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24194"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24228"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24229"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24271"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24379"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24680"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25119"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200703-25.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2007/dsa-1262"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ekiga.org/index.php?rub=10\u0026archive=1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:044"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2007_9_sr.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/31939"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0087.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/22613"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1017673"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-426-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/0655"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11642"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-134"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-05-23 14:55
Modified
2024-11-21 01:50
Severity ?
Summary
The Portable Tool Library (aka PTLib) before 2.10.10, as used in Ekiga before 4.0.1, does not properly detect recursion during entity expansion, which allows remote attackers to cause a denial of service (memory and CPU consumption) via a crafted PXML document containing a large number of nested entity references, aka a "billion laughs attack."
References
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2013-March/099553.html
secalert@redhat.comhttp://osvdb.org/91439
secalert@redhat.comhttp://seclists.org/oss-sec/2013/q1/674
secalert@redhat.comhttp://secunia.com/advisories/52659
secalert@redhat.comhttp://sourceforge.net/p/opalvoip/code/28856Exploit, Patch
secalert@redhat.comhttp://www.ekiga.org/news/2013-02-21/ekiga-4.0.1-stable-availablePatch, Vendor Advisory
secalert@redhat.comhttp://www.securityfocus.com/bid/58520
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/82885
secalert@redhat.comhttps://www.suse.com/support/update/announcement/2014/suse-su-20140237-1.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2013-March/099553.html
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/91439
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/oss-sec/2013/q1/674
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/52659
af854a3a-2127-422b-91ae-364da2661108http://sourceforge.net/p/opalvoip/code/28856Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://www.ekiga.org/news/2013-02-21/ekiga-4.0.1-stable-availablePatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/58520
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/82885
af854a3a-2127-422b-91ae-364da2661108https://www.suse.com/support/update/announcement/2014/suse-su-20140237-1.html



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:opalvoip:portable_tool_library:2.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "31829F37-ECE5-46CF-B7D9-1D9CDE094607",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opalvoip:portable_tool_library:2.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4864CF35-4A44-43A7-A954-191F5FDA3856",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opalvoip:portable_tool_library:2.10.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9BA5CE2-2473-4F31-8438-1D7FFECD5EB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opalvoip:portable_tool_library:2.10.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "87CC24E3-5CC6-45CC-BC26-E9A0EE8FF923",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ekiga:ekiga:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8659F6D2-9C7D-40AE-B783-7E5ECD50D28A",
              "versionEndIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:suse:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "C3407560-6D54-4B1B-9977-AD4F6EB5D6BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "777F6902-6EFA-482A-9A17-48DA5BDDB9CD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Portable Tool Library (aka PTLib) before 2.10.10, as used in Ekiga before 4.0.1, does not properly detect recursion during entity expansion, which allows remote attackers to cause a denial of service (memory and CPU consumption) via a crafted PXML document containing a large number of nested entity references, aka a \"billion laughs attack.\""
    },
    {
      "lang": "es",
      "value": "Portable Tool Library (tambi\u00e9n conocido como PTLib) anterior a 2.10.10, utilizado en Ekiga anterior a 4.0.1, no detecta debidamente recursi\u00f3n durante expansi\u00f3n de entidad, lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de memoria y CPU) a trav\u00e9s de un documento PXML manipulado que contiene un n\u00famero grande de referencias de entidad anidadas, tambi\u00e9n conocido como \u0027ataque de un bill\u00f3n de risas.\u0027"
    }
  ],
  "id": "CVE-2013-1864",
  "lastModified": "2024-11-21T01:50:33.123",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-05-23T14:55:09.630",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-March/099553.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://osvdb.org/91439"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://seclists.org/oss-sec/2013/q1/674"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/52659"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://sourceforge.net/p/opalvoip/code/28856"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.ekiga.org/news/2013-02-21/ekiga-4.0.1-stable-available"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/58520"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82885"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.suse.com/support/update/announcement/2014/suse-su-20140237-1.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-March/099553.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/91439"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/oss-sec/2013/q1/674"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/52659"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://sourceforge.net/p/opalvoip/code/28856"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.ekiga.org/news/2013-02-21/ekiga-4.0.1-stable-available"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/58520"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82885"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.suse.com/support/update/announcement/2014/suse-su-20140237-1.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-09-29 22:55
Modified
2024-11-21 01:44
Severity ?
Summary
lib/engine/components/opal/opal-call.cpp in ekiga before 4.0.0 allows remote attackers to cause a denial of service (crash) via an OPAL connection with a party name that contains invalid UTF-8 strings.
Impacted products
Vendor Product Version
ekiga ekiga *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ekiga:ekiga:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "066D2914-E039-4509-8195-7ECC74F57E1F",
              "versionEndIncluding": "3.9.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "lib/engine/components/opal/opal-call.cpp in ekiga before 4.0.0 allows remote attackers to cause a denial of service (crash) via an OPAL connection with a party name that contains invalid UTF-8 strings."
    },
    {
      "lang": "es",
      "value": "lib/engine/components/opal/opal-call.cpp en ekiga anterior a 4.0.0 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de una conexi\u00f3n con un nombre de parte que contiene cadenas UTF-8 inv\u00e1lidas."
    }
  ],
  "id": "CVE-2012-5621",
  "lastModified": "2024-11-21T01:44:59.320",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-09-29T22:55:05.003",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://ftp.gnome.org/pub/gnome/sources/ekiga/4.0/ekiga-4.0.0.news"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://seclists.org/oss-sec/2012/q4/407"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/56790"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2012_5621_denial_of"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=883058"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80640"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://git.gnome.org/browse/ekiga/commit/?id=7d09807257"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/pipermail/package-announce/2013-March/099554.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ftp.gnome.org/pub/gnome/sources/ekiga/4.0/ekiga-4.0.0.news"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/oss-sec/2012/q4/407"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/56790"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2012_5621_denial_of"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=883058"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80640"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://git.gnome.org/browse/ekiga/commit/?id=7d09807257"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/pipermail/package-announce/2013-March/099554.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-04-22 16:29
Modified
2024-11-21 01:27
Summary
Ekiga versions before 3.3.0 attempted to load a module from /tmp/ekiga_test.so.
Impacted products
Vendor Product Version
ekiga ekiga *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ekiga:ekiga:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "06573185-ED16-4791-A007-EAA0CBE78E26",
              "versionEndExcluding": "3.3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Ekiga versions before 3.3.0 attempted to load a module from /tmp/ekiga_test.so."
    },
    {
      "lang": "es",
      "value": "Las versiones de Ekiga anteriores a la 3.3.0 intentaron cargar un m\u00f3dulo desde /tmp/ekiga_test.so."
    }
  ],
  "id": "CVE-2011-1830",
  "lastModified": "2024-11-21T01:27:08.117",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 5.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
          "version": "3.0"
        },
        "exploitabilityScore": 1.5,
        "impactScore": 3.7,
        "source": "security@ubuntu.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-04-22T16:29:00.223",
  "references": [
    {
      "source": "security@ubuntu.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.gnome.org/GNOME/ekiga/commit/02654fc949722a78d41fcffac8687d73d8574647"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.gnome.org/GNOME/ekiga/commit/02654fc949722a78d41fcffac8687d73d8574647"
    }
  ],
  "sourceIdentifier": "security@ubuntu.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2012-5621
Vulnerability from cvelistv5
Published
2014-09-29 22:00
Modified
2024-08-06 21:14
Severity ?
Summary
lib/engine/components/opal/opal-call.cpp in ekiga before 4.0.0 allows remote attackers to cause a denial of service (crash) via an OPAL connection with a party name that contains invalid UTF-8 strings.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:14:16.078Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2012_5621_denial_of"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=883058"
          },
          {
            "name": "FEDORA-2013-2998",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/pipermail/package-announce/2013-March/099554.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ftp.gnome.org/pub/gnome/sources/ekiga/4.0/ekiga-4.0.0.news"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://git.gnome.org/browse/ekiga/commit/?id=7d09807257"
          },
          {
            "name": "ekiga-utf8-dos(80640)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80640"
          },
          {
            "name": "56790",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/56790"
          },
          {
            "name": "[oss-security] 20121203 Re: CVE Request -- Ekiga (x \u003c 4.0.0): DoS (crash) after receiving call from other party with not UTF-8 valid name",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://seclists.org/oss-sec/2012/q4/407"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-10-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "lib/engine/components/opal/opal-call.cpp in ekiga before 4.0.0 allows remote attackers to cause a denial of service (crash) via an OPAL connection with a party name that contains invalid UTF-8 strings."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2012_5621_denial_of"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=883058"
        },
        {
          "name": "FEDORA-2013-2998",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/pipermail/package-announce/2013-March/099554.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ftp.gnome.org/pub/gnome/sources/ekiga/4.0/ekiga-4.0.0.news"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://git.gnome.org/browse/ekiga/commit/?id=7d09807257"
        },
        {
          "name": "ekiga-utf8-dos(80640)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80640"
        },
        {
          "name": "56790",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/56790"
        },
        {
          "name": "[oss-security] 20121203 Re: CVE Request -- Ekiga (x \u003c 4.0.0): DoS (crash) after receiving call from other party with not UTF-8 valid name",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://seclists.org/oss-sec/2012/q4/407"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2012-5621",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "lib/engine/components/opal/opal-call.cpp in ekiga before 4.0.0 allows remote attackers to cause a denial of service (crash) via an OPAL connection with a party name that contains invalid UTF-8 strings."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://blogs.oracle.com/sunsecurity/entry/cve_2012_5621_denial_of",
              "refsource": "CONFIRM",
              "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2012_5621_denial_of"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=883058",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=883058"
            },
            {
              "name": "FEDORA-2013-2998",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/pipermail/package-announce/2013-March/099554.html"
            },
            {
              "name": "http://ftp.gnome.org/pub/gnome/sources/ekiga/4.0/ekiga-4.0.0.news",
              "refsource": "CONFIRM",
              "url": "http://ftp.gnome.org/pub/gnome/sources/ekiga/4.0/ekiga-4.0.0.news"
            },
            {
              "name": "https://git.gnome.org/browse/ekiga/commit/?id=7d09807257",
              "refsource": "CONFIRM",
              "url": "https://git.gnome.org/browse/ekiga/commit/?id=7d09807257"
            },
            {
              "name": "ekiga-utf8-dos(80640)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80640"
            },
            {
              "name": "56790",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/56790"
            },
            {
              "name": "[oss-security] 20121203 Re: CVE Request -- Ekiga (x \u003c 4.0.0): DoS (crash) after receiving call from other party with not UTF-8 valid name",
              "refsource": "MLIST",
              "url": "http://seclists.org/oss-sec/2012/q4/407"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-5621",
    "datePublished": "2014-09-29T22:00:00",
    "dateReserved": "2012-10-24T00:00:00",
    "dateUpdated": "2024-08-06T21:14:16.078Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-4897
Vulnerability from cvelistv5
Published
2007-09-14 18:00
Modified
2024-08-07 15:08
Severity ?
Summary
pwlib, as used by Ekiga 2.0.5 and possibly other products, allows remote attackers to cause a denial of service (application crash) via a long argument to the PString::vsprintf function, related to a "memory management flaw". NOTE: this issue was originally reported as being in the SIPURL::GetHostAddress function in Ekiga (formerly GnomeMeeting).
References
http://secunia.com/advisories/28385third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-561-1vendor-advisory, x_refsource_UBUNTU
https://bugzilla.redhat.com/show_bug.cgi?id=292831x_refsource_CONFIRM
http://www.securityfocus.com/archive/1/479185/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://blog.s21sec.com/2007/09/sobre-la-vulnerabilidad-del-ekiga.htmlx_refsource_MISC
http://www.securitytracker.com/id?1018683vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/27150third-party-advisory, x_refsource_SECUNIA
http://securityreason.com/securityalert/3138third-party-advisory, x_refsource_SREASON
http://openh323.cvs.sourceforge.net/openh323/opal/src/sip/sipcon.cxx?r1=2.120.2.25&r2=2.120.2.26&pathrev=v2_2_9x_refsource_MISC
http://marc.info/?l=full-disclosure&m=118959114522339&w=2mailing-list, x_refsource_FULLDISC
https://exchange.xforce.ibmcloud.com/vulnerabilities/36568vdb-entry, x_refsource_XF
http://secunia.com/advisories/27127third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/25642vdb-entry, x_refsource_BID
http://www.s21sec.com/avisos/s21sec-036-en.txtx_refsource_MISC
http://secunia.com/advisories/27518third-party-advisory, x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10928vdb-entry, signature, x_refsource_OVAL
http://www.mandriva.com/security/advisories?name=MDKSA-2007:206vendor-advisory, x_refsource_MANDRIVA
http://www.redhat.com/support/errata/RHSA-2007-0932.htmlvendor-advisory, x_refsource_REDHAT
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T15:08:33.970Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "28385",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28385"
          },
          {
            "name": "USN-561-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-561-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=292831"
          },
          {
            "name": "20070912 S21SEC-036-EN Ekiga \u003c= 2.0.5 Denial of service",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/479185/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://blog.s21sec.com/2007/09/sobre-la-vulnerabilidad-del-ekiga.html"
          },
          {
            "name": "1018683",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1018683"
          },
          {
            "name": "27150",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27150"
          },
          {
            "name": "3138",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/3138"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://openh323.cvs.sourceforge.net/openh323/opal/src/sip/sipcon.cxx?r1=2.120.2.25\u0026r2=2.120.2.26\u0026pathrev=v2_2_9"
          },
          {
            "name": "20070912 S21SEC-036-EN Ekiga \u003c= 2.0.5 Denial of service",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=full-disclosure\u0026m=118959114522339\u0026w=2"
          },
          {
            "name": "ekiga-sipurlgethostaddress-dos(36568)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36568"
          },
          {
            "name": "27127",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27127"
          },
          {
            "name": "25642",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/25642"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.s21sec.com/avisos/s21sec-036-en.txt"
          },
          {
            "name": "27518",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27518"
          },
          {
            "name": "oval:org.mitre.oval:def:10928",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10928"
          },
          {
            "name": "MDKSA-2007:206",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:206"
          },
          {
            "name": "RHSA-2007:0932",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2007-0932.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-09-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "pwlib, as used by Ekiga 2.0.5 and possibly other products, allows remote attackers to cause a denial of service (application crash) via a long argument to the PString::vsprintf function, related to a \"memory management flaw\". NOTE: this issue was originally reported as being in the SIPURL::GetHostAddress function in Ekiga (formerly GnomeMeeting)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-15T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "28385",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28385"
        },
        {
          "name": "USN-561-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-561-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=292831"
        },
        {
          "name": "20070912 S21SEC-036-EN Ekiga \u003c= 2.0.5 Denial of service",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/479185/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://blog.s21sec.com/2007/09/sobre-la-vulnerabilidad-del-ekiga.html"
        },
        {
          "name": "1018683",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1018683"
        },
        {
          "name": "27150",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27150"
        },
        {
          "name": "3138",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/3138"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://openh323.cvs.sourceforge.net/openh323/opal/src/sip/sipcon.cxx?r1=2.120.2.25\u0026r2=2.120.2.26\u0026pathrev=v2_2_9"
        },
        {
          "name": "20070912 S21SEC-036-EN Ekiga \u003c= 2.0.5 Denial of service",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://marc.info/?l=full-disclosure\u0026m=118959114522339\u0026w=2"
        },
        {
          "name": "ekiga-sipurlgethostaddress-dos(36568)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36568"
        },
        {
          "name": "27127",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27127"
        },
        {
          "name": "25642",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/25642"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.s21sec.com/avisos/s21sec-036-en.txt"
        },
        {
          "name": "27518",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27518"
        },
        {
          "name": "oval:org.mitre.oval:def:10928",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10928"
        },
        {
          "name": "MDKSA-2007:206",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:206"
        },
        {
          "name": "RHSA-2007:0932",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2007-0932.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-4897",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "pwlib, as used by Ekiga 2.0.5 and possibly other products, allows remote attackers to cause a denial of service (application crash) via a long argument to the PString::vsprintf function, related to a \"memory management flaw\". NOTE: this issue was originally reported as being in the SIPURL::GetHostAddress function in Ekiga (formerly GnomeMeeting)."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "28385",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28385"
            },
            {
              "name": "USN-561-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-561-1"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=292831",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=292831"
            },
            {
              "name": "20070912 S21SEC-036-EN Ekiga \u003c= 2.0.5 Denial of service",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/479185/100/0/threaded"
            },
            {
              "name": "http://blog.s21sec.com/2007/09/sobre-la-vulnerabilidad-del-ekiga.html",
              "refsource": "MISC",
              "url": "http://blog.s21sec.com/2007/09/sobre-la-vulnerabilidad-del-ekiga.html"
            },
            {
              "name": "1018683",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1018683"
            },
            {
              "name": "27150",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27150"
            },
            {
              "name": "3138",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/3138"
            },
            {
              "name": "http://openh323.cvs.sourceforge.net/openh323/opal/src/sip/sipcon.cxx?r1=2.120.2.25\u0026r2=2.120.2.26\u0026pathrev=v2_2_9",
              "refsource": "MISC",
              "url": "http://openh323.cvs.sourceforge.net/openh323/opal/src/sip/sipcon.cxx?r1=2.120.2.25\u0026r2=2.120.2.26\u0026pathrev=v2_2_9"
            },
            {
              "name": "20070912 S21SEC-036-EN Ekiga \u003c= 2.0.5 Denial of service",
              "refsource": "FULLDISC",
              "url": "http://marc.info/?l=full-disclosure\u0026m=118959114522339\u0026w=2"
            },
            {
              "name": "ekiga-sipurlgethostaddress-dos(36568)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36568"
            },
            {
              "name": "27127",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27127"
            },
            {
              "name": "25642",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/25642"
            },
            {
              "name": "http://www.s21sec.com/avisos/s21sec-036-en.txt",
              "refsource": "MISC",
              "url": "http://www.s21sec.com/avisos/s21sec-036-en.txt"
            },
            {
              "name": "27518",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27518"
            },
            {
              "name": "oval:org.mitre.oval:def:10928",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10928"
            },
            {
              "name": "MDKSA-2007:206",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:206"
            },
            {
              "name": "RHSA-2007:0932",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2007-0932.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-4897",
    "datePublished": "2007-09-14T18:00:00",
    "dateReserved": "2007-09-14T00:00:00",
    "dateUpdated": "2024-08-07T15:08:33.970Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-1830
Vulnerability from cvelistv5
Published
2019-04-22 15:35
Modified
2024-09-17 00:35
Summary
Ekiga versions before 3.3.0 attempted to load a module from /tmp/ekiga_test.so.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:37:25.835Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gitlab.gnome.org/GNOME/ekiga/commit/02654fc949722a78d41fcffac8687d73d8574647"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Ekiga",
          "vendor": "Gnome",
          "versions": [
            {
              "lessThan": "3.3.0",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Robert Collins"
        }
      ],
      "datePublic": "2009-07-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Ekiga versions before 3.3.0 attempted to load a module from /tmp/ekiga_test.so."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Accidentally enabled debugging code.",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-04-22T15:35:58",
        "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
        "shortName": "canonical"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gitlab.gnome.org/GNOME/ekiga/commit/02654fc949722a78d41fcffac8687d73d8574647"
        }
      ],
      "source": {
        "defect": [
          "https://bugs.launchpad.net/ubuntu/+source/ekiga/+bug/791652"
        ],
        "discovery": "INTERNAL"
      },
      "title": "Ekiga attempts to dlopen /tmp/ekiga_test.so",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@ubuntu.com",
          "DATE_PUBLIC": "2009-07-01T00:00:00.000Z",
          "ID": "CVE-2011-1830",
          "STATE": "PUBLIC",
          "TITLE": "Ekiga attempts to dlopen /tmp/ekiga_test.so"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Ekiga",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c",
                            "version_affected": "\u003c",
                            "version_value": "3.3.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Gnome"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "Robert Collins"
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Ekiga versions before 3.3.0 attempted to load a module from /tmp/ekiga_test.so."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Accidentally enabled debugging code."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://gitlab.gnome.org/GNOME/ekiga/commit/02654fc949722a78d41fcffac8687d73d8574647",
              "refsource": "MISC",
              "url": "https://gitlab.gnome.org/GNOME/ekiga/commit/02654fc949722a78d41fcffac8687d73d8574647"
            }
          ]
        },
        "source": {
          "defect": [
            "https://bugs.launchpad.net/ubuntu/+source/ekiga/+bug/791652"
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
    "assignerShortName": "canonical",
    "cveId": "CVE-2011-1830",
    "datePublished": "2019-04-22T15:35:58.768973Z",
    "dateReserved": "2011-04-27T00:00:00",
    "dateUpdated": "2024-09-17T00:35:49.614Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-1006
Vulnerability from cvelistv5
Published
2007-02-20 00:00
Modified
2024-08-07 12:43
Severity ?
Summary
Multiple format string vulnerabilities in the gm_main_window_flash_message function in Ekiga before 2.0.5 allow attackers to cause a denial of service and possibly execute arbitrary code via a crafted Q.931 SETUP packet.
References
http://www.mandriva.com/security/advisories?name=MDKSA-2007:044vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/25119third-party-advisory, x_refsource_SECUNIA
http://fedoranews.org/cms/node/2682vendor-advisory, x_refsource_FEDORA
http://mail.gnome.org/archives/ekiga-list/2007-February/msg00060.htmlmailing-list, x_refsource_MLIST
http://labs.musecurity.com/advisories/MU-200702-01.txtx_refsource_MISC
http://www.osvdb.org/31939vdb-entry, x_refsource_OSVDB
http://www.securityfocus.com/bid/22613vdb-entry, x_refsource_BID
http://secunia.com/advisories/24271third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/24379third-party-advisory, x_refsource_SECUNIA
http://www.novell.com/linux/security/advisories/2007_9_sr.htmlvendor-advisory, x_refsource_SUSE
http://security.gentoo.org/glsa/glsa-200703-25.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/24228third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2007/dsa-1262vendor-advisory, x_refsource_DEBIAN
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11642vdb-entry, signature, x_refsource_OVAL
http://secunia.com/advisories/24680third-party-advisory, x_refsource_SECUNIA
http://fedoranews.org/cms/node/2683vendor-advisory, x_refsource_FEDORA
http://www.redhat.com/support/errata/RHSA-2007-0087.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/24229third-party-advisory, x_refsource_SECUNIA
http://www.ekiga.org/index.php?rub=10&archive=1x_refsource_CONFIRM
http://secunia.com/advisories/24194third-party-advisory, x_refsource_SECUNIA
http://www.securitytracker.com/id?1017673vdb-entry, x_refsource_SECTRACK
http://www.vupen.com/english/advisories/2007/0655vdb-entry, x_refsource_VUPEN
http://www.ubuntu.com/usn/usn-426-1vendor-advisory, x_refsource_UBUNTU
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T12:43:22.290Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "MDKSA-2007:044",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:044"
          },
          {
            "name": "25119",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25119"
          },
          {
            "name": "FEDORA-2007-262",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://fedoranews.org/cms/node/2682"
          },
          {
            "name": "[Ekiga-list] 20070213 Ekiga 2.0.5 available",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://mail.gnome.org/archives/ekiga-list/2007-February/msg00060.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://labs.musecurity.com/advisories/MU-200702-01.txt"
          },
          {
            "name": "31939",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/31939"
          },
          {
            "name": "22613",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/22613"
          },
          {
            "name": "24271",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24271"
          },
          {
            "name": "24379",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24379"
          },
          {
            "name": "SUSE-SR:2007:009",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2007_9_sr.html"
          },
          {
            "name": "GLSA-200703-25",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200703-25.xml"
          },
          {
            "name": "24228",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24228"
          },
          {
            "name": "DSA-1262",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2007/dsa-1262"
          },
          {
            "name": "oval:org.mitre.oval:def:11642",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11642"
          },
          {
            "name": "24680",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24680"
          },
          {
            "name": "FEDORA-2007-263",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://fedoranews.org/cms/node/2683"
          },
          {
            "name": "RHSA-2007:0087",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2007-0087.html"
          },
          {
            "name": "24229",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24229"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ekiga.org/index.php?rub=10\u0026archive=1"
          },
          {
            "name": "24194",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24194"
          },
          {
            "name": "1017673",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1017673"
          },
          {
            "name": "ADV-2007-0655",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/0655"
          },
          {
            "name": "USN-426-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-426-1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-02-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple format string vulnerabilities in the gm_main_window_flash_message function in Ekiga before 2.0.5 allow attackers to cause a denial of service and possibly execute arbitrary code via a crafted Q.931 SETUP packet."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-10T00:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "MDKSA-2007:044",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:044"
        },
        {
          "name": "25119",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25119"
        },
        {
          "name": "FEDORA-2007-262",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://fedoranews.org/cms/node/2682"
        },
        {
          "name": "[Ekiga-list] 20070213 Ekiga 2.0.5 available",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://mail.gnome.org/archives/ekiga-list/2007-February/msg00060.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://labs.musecurity.com/advisories/MU-200702-01.txt"
        },
        {
          "name": "31939",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/31939"
        },
        {
          "name": "22613",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/22613"
        },
        {
          "name": "24271",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24271"
        },
        {
          "name": "24379",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24379"
        },
        {
          "name": "SUSE-SR:2007:009",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2007_9_sr.html"
        },
        {
          "name": "GLSA-200703-25",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200703-25.xml"
        },
        {
          "name": "24228",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24228"
        },
        {
          "name": "DSA-1262",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2007/dsa-1262"
        },
        {
          "name": "oval:org.mitre.oval:def:11642",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11642"
        },
        {
          "name": "24680",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24680"
        },
        {
          "name": "FEDORA-2007-263",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://fedoranews.org/cms/node/2683"
        },
        {
          "name": "RHSA-2007:0087",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2007-0087.html"
        },
        {
          "name": "24229",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24229"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ekiga.org/index.php?rub=10\u0026archive=1"
        },
        {
          "name": "24194",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24194"
        },
        {
          "name": "1017673",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1017673"
        },
        {
          "name": "ADV-2007-0655",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/0655"
        },
        {
          "name": "USN-426-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-426-1"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2007-1006",
    "datePublished": "2007-02-20T00:00:00",
    "dateReserved": "2007-02-19T00:00:00",
    "dateUpdated": "2024-08-07T12:43:22.290Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-1864
Vulnerability from cvelistv5
Published
2014-05-23 14:00
Modified
2024-08-06 15:20
Severity ?
Summary
The Portable Tool Library (aka PTLib) before 2.10.10, as used in Ekiga before 4.0.1, does not properly detect recursion during entity expansion, which allows remote attackers to cause a denial of service (memory and CPU consumption) via a crafted PXML document containing a large number of nested entity references, aka a "billion laughs attack."
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T15:20:35.180Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "52659",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/52659"
          },
          {
            "name": "SUSE-SU-2014:0237",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "https://www.suse.com/support/update/announcement/2014/suse-su-20140237-1.html"
          },
          {
            "name": "ptlib-xml-dos(82885)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82885"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ekiga.org/news/2013-02-21/ekiga-4.0.1-stable-available"
          },
          {
            "name": "FEDORA-2013-2998",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-March/099553.html"
          },
          {
            "name": "91439",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/91439"
          },
          {
            "name": "[oss-security] 20130315 Re: CVE request: billion laughs flaw in ptlib",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://seclists.org/oss-sec/2013/q1/674"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/p/opalvoip/code/28856"
          },
          {
            "name": "58520",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/58520"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-01-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Portable Tool Library (aka PTLib) before 2.10.10, as used in Ekiga before 4.0.1, does not properly detect recursion during entity expansion, which allows remote attackers to cause a denial of service (memory and CPU consumption) via a crafted PXML document containing a large number of nested entity references, aka a \"billion laughs attack.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "52659",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/52659"
        },
        {
          "name": "SUSE-SU-2014:0237",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "https://www.suse.com/support/update/announcement/2014/suse-su-20140237-1.html"
        },
        {
          "name": "ptlib-xml-dos(82885)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82885"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ekiga.org/news/2013-02-21/ekiga-4.0.1-stable-available"
        },
        {
          "name": "FEDORA-2013-2998",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-March/099553.html"
        },
        {
          "name": "91439",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/91439"
        },
        {
          "name": "[oss-security] 20130315 Re: CVE request: billion laughs flaw in ptlib",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://seclists.org/oss-sec/2013/q1/674"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/p/opalvoip/code/28856"
        },
        {
          "name": "58520",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/58520"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-1864",
    "datePublished": "2014-05-23T14:00:00",
    "dateReserved": "2013-02-19T00:00:00",
    "dateUpdated": "2024-08-06T15:20:35.180Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-1007
Vulnerability from cvelistv5
Published
2007-02-20 17:00
Modified
2024-08-07 12:43
Severity ?
Summary
Format string vulnerability in GnomeMeeting 1.0.2 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format strings in the name, which is not properly handled in a call to the gnomemeeting_log_insert function.
References
http://secunia.com/advisories/25119third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/24271third-party-advisory, x_refsource_SECUNIA
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=229266x_refsource_CONFIRM
http://secunia.com/advisories/24284third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/24379third-party-advisory, x_refsource_SECUNIA
http://www.novell.com/linux/security/advisories/2007_9_sr.htmlvendor-advisory, x_refsource_SUSE
http://www.debian.org/security/2007/dsa-1262vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/24185third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2007-0086.htmlvendor-advisory, x_refsource_REDHAT
http://osvdb.org/32083vdb-entry, x_refsource_OSVDB
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11776vdb-entry, signature, x_refsource_OVAL
http://www.mandriva.com/security/advisories?name=MDKSA-2007:045vendor-advisory, x_refsource_MANDRIVA
ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.ascvendor-advisory, x_refsource_SGI
http://www.ubuntu.com/usn/usn-426-1vendor-advisory, x_refsource_UBUNTU
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T12:43:21.663Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "25119",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25119"
          },
          {
            "name": "24271",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24271"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=229266"
          },
          {
            "name": "24284",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24284"
          },
          {
            "name": "24379",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24379"
          },
          {
            "name": "SUSE-SR:2007:009",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2007_9_sr.html"
          },
          {
            "name": "DSA-1262",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2007/dsa-1262"
          },
          {
            "name": "24185",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24185"
          },
          {
            "name": "RHSA-2007:0086",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2007-0086.html"
          },
          {
            "name": "32083",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/32083"
          },
          {
            "name": "oval:org.mitre.oval:def:11776",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11776"
          },
          {
            "name": "MDKSA-2007:045",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:045"
          },
          {
            "name": "20070201-01-P",
            "tags": [
              "vendor-advisory",
              "x_refsource_SGI",
              "x_transferred"
            ],
            "url": "ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc"
          },
          {
            "name": "USN-426-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-426-1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-02-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Format string vulnerability in GnomeMeeting 1.0.2 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format strings in the name, which is not properly handled in a call to the gnomemeeting_log_insert function."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-10T00:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "25119",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25119"
        },
        {
          "name": "24271",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24271"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=229266"
        },
        {
          "name": "24284",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24284"
        },
        {
          "name": "24379",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24379"
        },
        {
          "name": "SUSE-SR:2007:009",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2007_9_sr.html"
        },
        {
          "name": "DSA-1262",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2007/dsa-1262"
        },
        {
          "name": "24185",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24185"
        },
        {
          "name": "RHSA-2007:0086",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2007-0086.html"
        },
        {
          "name": "32083",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/32083"
        },
        {
          "name": "oval:org.mitre.oval:def:11776",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11776"
        },
        {
          "name": "MDKSA-2007:045",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:045"
        },
        {
          "name": "20070201-01-P",
          "tags": [
            "vendor-advisory",
            "x_refsource_SGI"
          ],
          "url": "ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc"
        },
        {
          "name": "USN-426-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-426-1"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2007-1007",
    "datePublished": "2007-02-20T17:00:00",
    "dateReserved": "2007-02-19T00:00:00",
    "dateUpdated": "2024-08-07T12:43:21.663Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-4924
Vulnerability from cvelistv5
Published
2007-10-08 21:00
Modified
2024-08-07 15:08
Severity ?
Summary
The Open Phone Abstraction Library (opal), as used by (1) Ekiga before 2.0.10 and (2) OpenH323 before 2.2.4, allows remote attackers to cause a denial of service (crash) via an invalid Content-Length header field in Session Initiation Protocol (SIP) packets, which causes a \0 byte to be written to an "attacker-controlled address."
References
http://secunia.com/advisories/27118third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/27271third-party-advisory, x_refsource_SECUNIA
http://www.securitytracker.com/id?1018776vdb-entry, x_refsource_SECTRACK
http://www.securityfocus.com/bid/25955vdb-entry, x_refsource_BID
http://secunia.com/advisories/27129third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2007:205vendor-advisory, x_refsource_MANDRIVA
https://bugzilla.redhat.com/show_bug.cgi?id=296371x_refsource_CONFIRM
http://secunia.com/advisories/28380third-party-advisory, x_refsource_SECUNIA
http://osvdb.org/41637vdb-entry, x_refsource_OSVDB
http://www.redhat.com/support/errata/RHSA-2007-0957.htmlvendor-advisory, x_refsource_REDHAT
http://mail.gnome.org/archives/ekiga-list/2007-September/msg00103.htmlmailing-list, x_refsource_MLIST
http://www.ubuntu.com/usn/usn-562-1vendor-advisory, x_refsource_UBUNTU
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11398vdb-entry, signature, x_refsource_OVAL
http://www.s21sec.com/avisos/s21sec-037-en.txtx_refsource_MISC
http://www.securityfocus.com/archive/1/482120/30/4500/threadedmailing-list, x_refsource_BUGTRAQ
http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.htmlvendor-advisory, x_refsource_SUSE
http://www.vupen.com/english/advisories/2007/3413vdb-entry, x_refsource_VUPEN
http://www.vupen.com/english/advisories/2007/3414vdb-entry, x_refsource_VUPEN
https://www.exploit-db.com/exploits/9240exploit, x_refsource_EXPLOIT-DB
http://secunia.com/advisories/27524third-party-advisory, x_refsource_SECUNIA
http://openh323.cvs.sourceforge.net/openh323/opal/src/sip/sippdu.cxx?r1=2.83.2.19&r2=2.83.2.20x_refsource_CONFIRM
http://secunia.com/advisories/27128third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T15:08:34.248Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "27118",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27118"
          },
          {
            "name": "27271",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27271"
          },
          {
            "name": "1018776",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1018776"
          },
          {
            "name": "25955",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/25955"
          },
          {
            "name": "27129",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27129"
          },
          {
            "name": "MDKSA-2007:205",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:205"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=296371"
          },
          {
            "name": "28380",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28380"
          },
          {
            "name": "41637",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/41637"
          },
          {
            "name": "RHSA-2007:0957",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2007-0957.html"
          },
          {
            "name": "[ekiga-list] 20070917 [ANNOUNCE] Ekiga 2.0.10 released",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://mail.gnome.org/archives/ekiga-list/2007-September/msg00103.html"
          },
          {
            "name": "USN-562-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-562-1"
          },
          {
            "name": "oval:org.mitre.oval:def:11398",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11398"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.s21sec.com/avisos/s21sec-037-en.txt"
          },
          {
            "name": "20071011 S21SEC-037-en: OPAL SIP Protocol Remote Denial of Service",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/482120/30/4500/threaded"
          },
          {
            "name": "SUSE-SR:2007:021",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html"
          },
          {
            "name": "ADV-2007-3413",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/3413"
          },
          {
            "name": "ADV-2007-3414",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/3414"
          },
          {
            "name": "9240",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/9240"
          },
          {
            "name": "27524",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27524"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://openh323.cvs.sourceforge.net/openh323/opal/src/sip/sippdu.cxx?r1=2.83.2.19\u0026r2=2.83.2.20"
          },
          {
            "name": "27128",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27128"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-09-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Open Phone Abstraction Library (opal), as used by (1) Ekiga before 2.0.10 and (2) OpenH323 before 2.2.4, allows remote attackers to cause a denial of service (crash) via an invalid Content-Length header field in Session Initiation Protocol (SIP) packets, which causes a \\0 byte to be written to an \"attacker-controlled address.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-15T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "27118",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27118"
        },
        {
          "name": "27271",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27271"
        },
        {
          "name": "1018776",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1018776"
        },
        {
          "name": "25955",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/25955"
        },
        {
          "name": "27129",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27129"
        },
        {
          "name": "MDKSA-2007:205",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:205"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=296371"
        },
        {
          "name": "28380",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28380"
        },
        {
          "name": "41637",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/41637"
        },
        {
          "name": "RHSA-2007:0957",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2007-0957.html"
        },
        {
          "name": "[ekiga-list] 20070917 [ANNOUNCE] Ekiga 2.0.10 released",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://mail.gnome.org/archives/ekiga-list/2007-September/msg00103.html"
        },
        {
          "name": "USN-562-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-562-1"
        },
        {
          "name": "oval:org.mitre.oval:def:11398",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11398"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.s21sec.com/avisos/s21sec-037-en.txt"
        },
        {
          "name": "20071011 S21SEC-037-en: OPAL SIP Protocol Remote Denial of Service",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/482120/30/4500/threaded"
        },
        {
          "name": "SUSE-SR:2007:021",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html"
        },
        {
          "name": "ADV-2007-3413",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/3413"
        },
        {
          "name": "ADV-2007-3414",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/3414"
        },
        {
          "name": "9240",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/9240"
        },
        {
          "name": "27524",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27524"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://openh323.cvs.sourceforge.net/openh323/opal/src/sip/sippdu.cxx?r1=2.83.2.19\u0026r2=2.83.2.20"
        },
        {
          "name": "27128",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27128"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-4924",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Open Phone Abstraction Library (opal), as used by (1) Ekiga before 2.0.10 and (2) OpenH323 before 2.2.4, allows remote attackers to cause a denial of service (crash) via an invalid Content-Length header field in Session Initiation Protocol (SIP) packets, which causes a \\0 byte to be written to an \"attacker-controlled address.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "27118",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27118"
            },
            {
              "name": "27271",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27271"
            },
            {
              "name": "1018776",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1018776"
            },
            {
              "name": "25955",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/25955"
            },
            {
              "name": "27129",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27129"
            },
            {
              "name": "MDKSA-2007:205",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:205"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=296371",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=296371"
            },
            {
              "name": "28380",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28380"
            },
            {
              "name": "41637",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/41637"
            },
            {
              "name": "RHSA-2007:0957",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2007-0957.html"
            },
            {
              "name": "[ekiga-list] 20070917 [ANNOUNCE] Ekiga 2.0.10 released",
              "refsource": "MLIST",
              "url": "http://mail.gnome.org/archives/ekiga-list/2007-September/msg00103.html"
            },
            {
              "name": "USN-562-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-562-1"
            },
            {
              "name": "oval:org.mitre.oval:def:11398",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11398"
            },
            {
              "name": "http://www.s21sec.com/avisos/s21sec-037-en.txt",
              "refsource": "MISC",
              "url": "http://www.s21sec.com/avisos/s21sec-037-en.txt"
            },
            {
              "name": "20071011 S21SEC-037-en: OPAL SIP Protocol Remote Denial of Service",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/482120/30/4500/threaded"
            },
            {
              "name": "SUSE-SR:2007:021",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html"
            },
            {
              "name": "ADV-2007-3413",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/3413"
            },
            {
              "name": "ADV-2007-3414",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/3414"
            },
            {
              "name": "9240",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/9240"
            },
            {
              "name": "27524",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27524"
            },
            {
              "name": "http://openh323.cvs.sourceforge.net/openh323/opal/src/sip/sippdu.cxx?r1=2.83.2.19\u0026r2=2.83.2.20",
              "refsource": "CONFIRM",
              "url": "http://openh323.cvs.sourceforge.net/openh323/opal/src/sip/sippdu.cxx?r1=2.83.2.19\u0026r2=2.83.2.20"
            },
            {
              "name": "27128",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27128"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-4924",
    "datePublished": "2007-10-08T21:00:00",
    "dateReserved": "2007-09-17T00:00:00",
    "dateUpdated": "2024-08-07T15:08:34.248Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}