First published: Mon Sep 17 2007(Updated: )
Common Vulnerabilities and Exposures assigned an identifier <a href="https://access.redhat.com/security/cve/CVE-2007-4897">CVE-2007-4897</a> to the following vulnerability: The SIPURL::GetHostAddress function in Ekiga (formerly GnomeMeeting) 2.0.5 and earlier allows remote attackers to cause a denial of service (application crash) via unspecified vectors, related to "bad management of memory allocation." References: <a href="http://www.securityfocus.com/bid/25642">http://www.securityfocus.com/bid/25642</a> <a href="http://www.s21sec.com/avisos/s21sec-036-en.txt">http://www.s21sec.com/avisos/s21sec-036-en.txt</a> <a href="http://marc.info/?l=full-disclosure&m=118959114522339&w=2">http://marc.info/?l=full-disclosure&m=118959114522339&w=2</a> Note: Advisory posted to full-disclosure stated versions 2.0.5 and prior are vulnerable. s21sec site seems to have updated advisory stating version 2.0.7 is also vulnerable.
Affected Software | Affected Version | How to fix |
---|---|---|
Ekiga | <2.0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability REDHAT-BUG-292831 is considered to be of medium severity due to its potential for causing denial of service.
To fix REDHAT-BUG-292831, update Ekiga to version 2.0.8 or later, which addresses the vulnerability.
Ekiga versions 2.0.5 and earlier are affected by the vulnerability REDHAT-BUG-292831.
REDHAT-BUG-292831 is categorized as a denial of service vulnerability.
Remote attackers can exploit the REDHAT-BUG-292831 vulnerability to disrupt service availability.