First published: Tue Nov 29 2005(Updated: )
The automatic update feature in Google Talk allows remote attackers to cause a denial of service (CPU and memory consumption) by poisoning a target's DNS cache and causing a large update file to be sent, which consumes large amounts of CPU and memory during the signature verification, aka BenjiBug.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Google Talk Plugin |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2005-3899 is high due to its ability to cause denial of service through excessive CPU and memory consumption.
To fix CVE-2005-3899, you should disable the automatic update feature in Google Talk and monitor for any suspicious DNS behavior.
CVE-2005-3899 describes a denial of service attack that targets Google Talk via DNS cache poisoning.
CVE-2005-3899 affects all versions of Google Talk that utilize its automatic update feature.
To mitigate CVE-2005-3899, users should implement DNSSEC to secure against DNS spoofing and monitor network traffic for anomalies.