7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.086 Low
EPSS
Percentile
94.5%
CentOS Errata and Security Advisory CESA-2005:639
The kdenetwork package contains networking applications for the K Desktop
Environment. Kopete is a KDE instant messenger which supports a number of
protocols including ICQ, MSN, Yahoo, Jabber, and Gadu-Gadu.
Multiple integer overflow flaws were found in the way Kopete processes
Gadu-Gadu messages. A remote attacker could send a specially crafted
Gadu-Gadu message which would cause Kopete to crash or possibly execute
arbitrary code. The Common Vulnerabilities and Exposures project
assigned the name CAN-2005-1852 to this issue.
In order to be affected by this issue, a user would need to have registered
with Gadu-Gadu and be signed in to the Gadu-Gadu server in order to receive
a malicious message. In addition, Red Hat believes that the Exec-shield
technology (enabled by default in Red Hat Enterprise Linux 4) would block
attempts to remotely exploit this vulnerability.
Note that this issue does not affect Red Hat Enterprise Linux 2.1 or 3.
Users of Kopete should update to these packages which contain a
patch to correct this issue.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2005-July/074108.html
https://lists.centos.org/pipermail/centos-announce/2005-July/074121.html
https://lists.centos.org/pipermail/centos-announce/2005-July/074122.html
Affected packages:
kdenetwork
kdenetwork-devel
kdenetwork-nowlistening
Upstream details at:
https://access.redhat.com/errata/RHSA-2005:639