CVE-2005-3891

Stack-based buffer overflow in Gadu-Gadu 7.20 allows remote attackers to cause a denial of service (crash) via an image filename between exactly 192 to 200 characters, which does not account for the "imgcache\" string that is added to the end of the buffer.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gadu-gadu:gadu-gadu_instant_messenger:7.20:*:*:*:*:*:*:*

History

21 Nov 2024, 00:02

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0658.html - Vendor Advisory () http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0658.html - Vendor Advisory
References () http://marc.info/?l=bugtraq&m=113261573023912&w=2 - () http://marc.info/?l=bugtraq&m=113261573023912&w=2 -
References () http://secunia.com/advisories/17597/ - Patch, Vendor Advisory () http://secunia.com/advisories/17597/ - Patch, Vendor Advisory
References () http://www.osvdb.org/21016 - () http://www.osvdb.org/21016 -
References () http://www.securityfocus.com/bid/15520/ - () http://www.securityfocus.com/bid/15520/ -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/23149 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/23149 -

Information

Published : 2005-11-29 21:03

Updated : 2024-11-21 00:02


NVD link : CVE-2005-3891

Mitre link : CVE-2005-3891

CVE.ORG link : CVE-2005-3891


JSON object : View

Products Affected

gadu-gadu

  • gadu-gadu_instant_messenger