Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:9252
HistoryJul 22, 2005 - 12:00 a.m.

Multiple vulnerabilities in libgadu and ekg package

2005-07-2200:00:00
vulners.com
9

0.056 Low

EPSS

Percentile

93.3%

Multiple vulnerabilities have been found in libgadu, a library for
handling Gadu-Gadu instant messaging protocol. It is a part of ekg, a
Gadu-Gadu client, but is widely used in other clients. Also some of the
user contributed scripts were found to behave in an insecure manner.

Bugs fixed in ekg-1.6rc3:

  • integer overflow in libgadu (CAN-2005-1852) that could be triggered by
    an incomming message and lead to application crash and/or remote code
    execution (discovered by Marcin Ślusarz),

Bugs fixed in ekg-1.6rc2:

  • insecure file creation in user contributed Python script
    (CAN-2005-1916, discovered by Eric Romang of ZATAZ audit),

  • insecure file creation (CAN-2005-1850) and shell command injection
    (CAN-2005-1851) in other user contributed scripts (discovered by
    Marcin Owsiany and Wojtek Kaniewski),

  • several signedness errors in libgadu that could be triggered by an
    incomming network data or an application passing invalid user input to
    the library (discovered by Grzegorz Jaśkiewicz),

  • memory alignment errors in libgadu that could be triggered by an
    incomming message and lead to bus errors on architectures like SPARC
    (discovered by Szymon Zygmunt and Michał Bartoszkiewicz),

  • endianness errors in libgadu that could cause invalid behaviour of
    applications on big-endian architectures (discovered by Marcin
    Ślusarz).

Update is strongly recommended. The current version of ekg (including
fixed libgadu) can be downloaded from:

http://dev.null.pl/ekg/ekg-1.6rc3.tar.gz

Note that due to frequent protocol modifications that require API and
ABI changes, several Gadu-Gadu clients include libgadu in their source
trees and use it as a static library. If you use Gadu-Gadu client based
on libgadu other than ekg, please consult your vendor whether an update
is necessary.

Regards,
Wojtek Kaniewski