First published: Tue Jul 26 2005(Updated: )
Multiple integer overflows in libgadu, as used in Kopete in KDE 3.2.3 to 3.4.1, ekg before 1.6rc3, GNU Gadu, CenterICQ, Kadu, and other packages, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an incoming message.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
ekg ekg | =1.4 | |
ekg ekg | =1.1_rc2 | |
ekg ekg | =1.0_rc3 | |
ekg ekg | =1.5_rc2 | |
ekg ekg | =1.5_rc1 | |
ekg ekg | =1.5 | |
ekg ekg | =1.1_rc1 | |
ekg ekg | =1.3 | |
ekg ekg | =1.0_rc2 | |
ekg ekg | =1.0 | |
ekg ekg | =1.1 | |
KDE KDE | =3.3.2 | |
KDE KDE | =3.3.1 | |
KDE KDE | =3.4.0 | |
KDE KDE | =3.4 | |
KDE KDE | =3.3 | |
KDE KDE | =3.2.3 | |
KDE KDE | =3.4.1 | |
CenterICQ | ||
Kadu Kadu |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-1852 presents a high severity risk due to its potential to allow remote code execution and denial of service.
To fix CVE-2005-1852, update to the latest version of the affected software packages that contain the security patches.
CVE-2005-1852 affects multiple versions of libgadu used in applications like Kopete, ekg, and Kadu.
CVE-2005-1852 enables remote attackers to potentially execute arbitrary code or cause a denial of service through crafted messages.
CVE-2005-1852 was disclosed on July 21, 2005, as part of a security advisory.