First published: Tue Feb 20 2007(Updated: )
Format string vulnerability in GnomeMeeting 1.0.2 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format strings in the name, which is not properly handled in a call to the gnomemeeting_log_insert function.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ekiga | =1.0.2 | |
Red Hat Enterprise Linux | =4.0 | |
Red Hat Enterprise Linux Desktop | =3.0 | |
Red Hat Enterprise Linux | =4.0 | |
Red Hat Enterprise Linux | =3.0 | |
Red Hat Enterprise Linux | =4.0 | |
Red Hat Enterprise Linux | =3.0 | |
Red Hat Enterprise Linux | =3.0 | |
Red Hat Enterprise Linux Desktop | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1007 is classified as a moderate severity vulnerability due to the potential for denial of service and arbitrary code execution.
To mitigate CVE-2007-1007, users should upgrade to the latest version of GnomeMeeting or ensure that appropriate patches are applied.
CVE-2007-1007 affects GnomeMeeting 1.0.2 and earlier versions, as well as several versions of Red Hat Enterprise Linux.
Yes, CVE-2007-1007 may allow remote attackers to execute arbitrary code due to improper handling of format strings.
You can determine if you are vulnerable to CVE-2007-1007 by checking if you are using GnomeMeeting 1.0.2 or earlier, or affected versions of Red Hat Enterprise Linux.