First published: Tue Jul 19 2005(Updated: )
A certain contributed script for ekg Gadu Gadu client 1.5 and earlier allows attackers to execute shell commands via unknown attack vectors.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
ekg | =1.0 | |
ekg | =1.0_rc2 | |
ekg | =1.0_rc3 | |
ekg | =1.1 | |
ekg | =1.1_rc1 | |
ekg | =1.1_rc2 | |
ekg | =1.3 | |
ekg | =1.4 | |
ekg | =1.5 | |
ekg | =1.5_rc1 | |
ekg | =1.5_rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-1851 is classified as a high severity vulnerability due to its potential to allow attackers to execute arbitrary shell commands.
To fix CVE-2005-1851, it is recommended to upgrade to a newer version of the ekg Gadu Gadu client that addresses this vulnerability.
CVE-2005-1851 affects ekg versions 1.0, 1.1, 1.3, 1.4, and 1.5, including their release candidates.
The potential impacts of CVE-2005-1851 include unauthorized access to the system and execution of malicious commands.
While upgrading is the best solution, temporarily restricting access to the ekg client can serve as a workaround until a patch is applied.