Executive Summary
Summary | |
---|---|
Title | pwlib security update |
Informations | |||
---|---|---|---|
Name | RHSA-2007:0932 | First vendor Publication | 2007-10-08 |
Vendor | RedHat | Last vendor Modification | 2007-10-08 |
Severity (Vendor) | Moderate | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: Updated pwlib packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 RHEL Desktop Workstation (v. 5 client) - i386, x86_64 RHEL Optional Productivity Applications (v. 5 server) - i386, x86_64 3. Problem description: PWLib is a library used to support cross-platform applications. In Red Hat Enterprise Linux 5, the Ekiga teleconferencing application uses PWLib. A memory management flaw was discovered in PWLib. An attacker could use this flaw to crash an application, such as Ekiga, which is linked with pwlib (CVE-2007-4897). Users should upgrade to these updated packages which contain a backported patch to correct this issue. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 5. Bug IDs fixed (http://bugzilla.redhat.com/): 292831 - CVE-2007-4897 ekiga GetHostAddress remote DoS |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2007-0932.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-399 | Resource Management Errors |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:10928 | |||
Oval ID: | oval:org.mitre.oval:def:10928 | ||
Title: | pwlib, as used by Ekiga 2.0.5 and possibly other products, allows remote attackers to cause a denial of service (application crash) via a long argument to the PString::vsprintf function, related to a "memory management flaw". NOTE: this issue was originally reported as being in the SIPURL::GetHostAddress function in Ekiga (formerly GnomeMeeting). | ||
Description: | pwlib, as used by Ekiga 2.0.5 and possibly other products, allows remote attackers to cause a denial of service (application crash) via a long argument to the PString::vsprintf function, related to a "memory management flaw". NOTE: this issue was originally reported as being in the SIPURL::GetHostAddress function in Ekiga (formerly GnomeMeeting). | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2007-4897 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:17687 | |||
Oval ID: | oval:org.mitre.oval:def:17687 | ||
Title: | USN-561-1 -- pwlib vulnerability | ||
Description: | Jose Miguel Esparza discovered that pwlib did not correctly handle large string lengths. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-561-1 CVE-2007-4897 | Version: | 7 |
Platform(s): | Ubuntu 6.06 Ubuntu 6.10 Ubuntu 7.04 Ubuntu 7.10 | Product(s): | pwlib |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22100 | |||
Oval ID: | oval:org.mitre.oval:def:22100 | ||
Title: | ELSA-2007:0932: pwlib security update (Moderate) | ||
Description: | pwlib, as used by Ekiga 2.0.5 and possibly other products, allows remote attackers to cause a denial of service (application crash) via a long argument to the PString::vsprintf function, related to a "memory management flaw". NOTE: this issue was originally reported as being in the SIPURL::GetHostAddress function in Ekiga (formerly GnomeMeeting). | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2007:0932-01 CVE-2007-4897 | Version: | 6 |
Platform(s): | Oracle Linux 5 | Product(s): | pwlib |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 |
ExploitDB Exploits
id | Description |
---|---|
2009-07-24 | Ekiga 2.0.5 - (GetHostAddress) Remote Denial of Service Exploit |
OpenVAS Exploits
Date | Description |
---|---|
2009-04-09 | Name : Mandriva Update for pwlib MDKSA-2007:206 (pwlib) File : nvt/gb_mandriva_MDKSA_2007_206.nasl |
2009-03-23 | Name : Ubuntu Update for pwlib vulnerability USN-561-1 File : nvt/gb_ubuntu_USN_561_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
41647 | PWLib src/ptlib/common/contain.cxx PString::vsprintf() Function Remote DoS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20071008_pwlib_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2010-01-06 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2007-0932.nasl - Type : ACT_GATHER_INFO |
2008-01-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-561-1.nasl - Type : ACT_GATHER_INFO |
2007-11-05 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2007-206.nasl - Type : ACT_GATHER_INFO |
2007-10-09 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2007-0932.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:51:02 |
|