Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.800823
Kategorie:Denial of Service
Titel:Pidgin OSCAR Protocol Denial Of Service Vulnerability (Windows)
Zusammenfassung:This host has installed Pidgin and is prone to Denial of Service; vulnerability.
Beschreibung:Summary:
This host has installed Pidgin and is prone to Denial of Service
vulnerability.

Vulnerability Insight:
Error in OSCAR protocol implementation leads to the application misinterpreting
the ICQWebMessage message type as ICQSMS message type via a crafted ICQ web
message that triggers allocation of a large amount of memory.

Vulnerability Impact:
Successful exploitation will allow attacker to cause an application crash.

Affected Software/OS:
Pidgin version prior to 2.5.8 on Windows

Solution:
Upgrade to Pidgin version 2.5.8.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Querverweis: BugTraq ID: 35530
Common Vulnerability Exposure (CVE) ID: CVE-2009-1889
http://www.securityfocus.com/bid/35530
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00162.html
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00176.html
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00228.html
http://pidgin.im/pipermail/devel/2009-May/008227.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10004
http://www.redhat.com/support/errata/RHSA-2009-1139.html
http://secunia.com/advisories/35693
http://secunia.com/advisories/35697
http://secunia.com/advisories/35706
http://secunia.com/advisories/37071
http://www.ubuntu.com/usn/USN-796-1
http://www.vupen.com/english/advisories/2009/1749
XForce ISS Database: pidgin-oscar-dos(51448)
https://exchange.xforce.ibmcloud.com/vulnerabilities/51448
CopyrightCopyright (C) 2009 Greenbone Networks GmbH

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.