First published: Wed Jun 27 2007(Updated: )
ekg before 1:1.7~rc2-1etch1 on Debian GNU/Linux Etch allows remote attackers to cause a denial of service (NULL pointer dereference) via a vector related to the token OCR functionality.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
ekg | =2005-04-11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1664 has a severity level classified as a denial of service vulnerability due to a NULL pointer dereference.
To fix CVE-2007-1664, upgrade to a version of ekg that is not affected by this vulnerability.
CVE-2007-1664 affects versions of ekg prior to 1:1.7~rc2-1etch1 on Debian GNU/Linux Etch 4.0.
Yes, CVE-2007-1664 can be exploited by remote attackers, leading to a denial of service condition.
CVE-2007-1664 impacts various architectures of Debian GNU/Linux Etch, including alpha, amd64, arm, hppa, and others.