4.3
CVSSv2

CVE-2008-4776

Published: 28/10/2008 Updated: 08/08/2017
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

libgadu prior to 1.8.2 allows remote servers to cause a denial of service (crash) via a contact description with a large length, which triggers a buffer over-read.

Vulnerable Product Search on Vulmon Subscribe to Product

wojtek kaniewsk libgadu 1.7.2

wojtek kaniewsk libgadu 1.7.0

wojtek kaniewsk libgadu

wojtek kaniewsk libgadu 1.8.0

wojtek kaniewsk libgadu 1.7.1

Vendor Advisories

Debian Bug report logs - #503916 CVE-2008-4776: remote DoS Package: libgadu3; Maintainer for libgadu3 is Debian QA Group <packages@qadebianorg>; Source for libgadu3 is src:libgadu (PTS, buildd, popcon) Reported by: Steffen Joeris <steffenjoeris@skolelinuxde> Date: Wed, 29 Oct 2008 10:15:01 UTC Severity: importan ...
It was discovered that the Gadu library, used by some Instant Messaging clients, did not correctly verify certain packet sizes from the server If a user connected to a malicious server, clients using Gadu could be made to crash, leading to a denial of service ...
It was discovered that ekg, a console Gadu Gadu client performs insufficient input sanitising in the code to parse contact descriptions, which may result in denial of service For the stable distribution (etch), this problem has been fixed in version 1:17~rc2-1etch2 For the unstable distribution (sid) and the upcoming stable distribution (lenny), ...