Lucene search

K
mageiaGentoo FoundationMGASA-2014-0074
HistoryFeb 16, 2014 - 5:23 p.m.

Updated libgadu packages fix security vulnerability

2014-02-1617:23:36
Gentoo Foundation
advisories.mageia.org
15

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.023

Percentile

89.7%

A malicious server or man-in-the-middle could send a large value for Content-Length and cause an integer overflow which could lead to a buffer overflow in Gadu-Gadu HTTP parsing (CVE-2013-6487).

OSVersionArchitecturePackageVersionFilename
Mageia3noarchlibgadu< 1.11.3-1libgadu-1.11.3-1.mga3
Mageia4noarchlibgadu< 1.11.3-1libgadu-1.11.3-1.mga4

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.023

Percentile

89.7%