First published: Tue Dec 04 2007(Updated: )
typespeed before 0.6.4 allows remote attackers to cause a denial of service (application crash) via unspecified network behavior that triggers a divide-by-zero error.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Typespeed | =0.4.2 | |
Typespeed | =0.4.4 | |
Typespeed | =0.6.3 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Typespeed | =0.4.1 | |
Debian Linux | =2.2 | |
Debian Linux | =2.2 | |
Debian Linux | =2.2 | |
Debian Linux | =2.2 | |
Debian Linux | =2.2 | |
Debian Linux | =2.2 | |
Debian Linux | =2.2 | |
Typespeed | =0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-6220 is classified as a denial of service vulnerability that can lead to application crashes.
CVE-2007-6220 affects Typespeed versions 0.4.1 to 0.6.3 inclusive.
To fix CVE-2007-6220, update Typespeed to version 0.6.4 or later.
CVE-2007-6220 can be exploited by remote attackers through specific network behavior that triggers a divide-by-zero error.
If an application is vulnerable to CVE-2007-6220, it may crash when exposed to the conditions that trigger the vulnerability.