Vulnerabilities > CVE-2007-4897 - Resource Management Errors vulnerability in Ekiga 2.0.5

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
ekiga
CWE-399
nessus
exploit available

Summary

pwlib, as used by Ekiga 2.0.5 and possibly other products, allows remote attackers to cause a denial of service (application crash) via a long argument to the PString::vsprintf function, related to a "memory management flaw". NOTE: this issue was originally reported as being in the SIPURL::GetHostAddress function in Ekiga (formerly GnomeMeeting).

Vulnerable Configurations

Part Description Count
Application
Ekiga
1

Common Weakness Enumeration (CWE)

Exploit-Db

descriptionEkiga 2.0.5 (GetHostAddress) Remote Denial of Service Exploit. CVE-2007-4897. Dos exploit for windows platform
idEDB-ID:9241
last seen2016-02-01
modified2009-07-24
published2009-07-24
reporterJose Miguel Esparza
sourcehttps://www.exploit-db.com/download/9241/
titleEkiga 2.0.5 - GetHostAddress Remote Denial of Service Exploit

Nessus

  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2007-206.NASL
    descriptionA memory management flaw was discovered in PWLib, that an attacker could use to crash an application linked with it, such as Ekiga. Updated packages have been patched to prevent these issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id27624
    published2007-11-05
    reporterThis script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/27624
    titleMandrake Linux Security Advisory : pwlib (MDKSA-2007:206)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2007-0932.NASL
    descriptionUpdated pwlib packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. PWLib is a library used to support cross-platform applications. In Red Hat Enterprise Linux 5, the Ekiga teleconferencing application uses PWLib. A memory management flaw was discovered in PWLib. An attacker could use this flaw to crash an application, such as Ekiga, which is linked with pwlib (CVE-2007-4897). Users should upgrade to these updated packages which contain a backported patch to correct this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id43653
    published2010-01-06
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/43653
    titleCentOS 5 : pwlib (CESA-2007:0932)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20071008_PWLIB_ON_SL5_X.NASL
    descriptionIn Scientific Linux 5, the Ekiga teleconferencing application uses PWLib. A memory management flaw was discovered in PWLib. An attacker could use this flaw to crash an application, such as Ekiga, which is linked with pwlib (CVE-2007-4897).
    last seen2020-06-01
    modified2020-06-02
    plugin id60265
    published2012-08-01
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/60265
    titleScientific Linux Security Update : pwlib on SL5.x i386/x86_64
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2007-0932.NASL
    descriptionUpdated pwlib packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. PWLib is a library used to support cross-platform applications. In Red Hat Enterprise Linux 5, the Ekiga teleconferencing application uses PWLib. A memory management flaw was discovered in PWLib. An attacker could use this flaw to crash an application, such as Ekiga, which is linked with pwlib (CVE-2007-4897). Users should upgrade to these updated packages which contain a backported patch to correct this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id26953
    published2007-10-09
    reporterThis script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/26953
    titleRHEL 5 : pwlib (RHSA-2007:0932)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-561-1.NASL
    descriptionJose Miguel Esparza discovered that pwlib did not correctly handle large string lengths. A remote attacker could send specially crafted packets to applications linked against pwlib (e.g. Ekiga) causing them to crash, leading to a denial of service. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id29917
    published2008-01-10
    reporterUbuntu Security Notice (C) 2008-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/29917
    titleUbuntu 6.06 LTS / 6.10 / 7.04 / 7.10 : pwlib vulnerability (USN-561-1)

Oval

accepted2013-04-29T04:10:01.852-04:00
classvulnerability
contributors
  • nameAharon Chernin
    organizationSCAP.com, LLC
  • nameDragos Prisaca
    organizationG2, Inc.
definition_extensions
  • commentThe operating system installed on the system is Red Hat Enterprise Linux 5
    ovaloval:org.mitre.oval:def:11414
  • commentThe operating system installed on the system is CentOS Linux 5.x
    ovaloval:org.mitre.oval:def:15802
  • commentOracle Linux 5.x
    ovaloval:org.mitre.oval:def:15459
descriptionpwlib, as used by Ekiga 2.0.5 and possibly other products, allows remote attackers to cause a denial of service (application crash) via a long argument to the PString::vsprintf function, related to a "memory management flaw". NOTE: this issue was originally reported as being in the SIPURL::GetHostAddress function in Ekiga (formerly GnomeMeeting).
familyunix
idoval:org.mitre.oval:def:10928
statusaccepted
submitted2010-07-09T03:56:16-04:00
titlepwlib, as used by Ekiga 2.0.5 and possibly other products, allows remote attackers to cause a denial of service (application crash) via a long argument to the PString::vsprintf function, related to a "memory management flaw". NOTE: this issue was originally reported as being in the SIPURL::GetHostAddress function in Ekiga (formerly GnomeMeeting).
version19

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/79578/ekiga207_dos.py.txt
idPACKETSTORM:79578
last seen2016-12-05
published2009-07-24
reporterJose Miguel Esparza
sourcehttps://packetstormsecurity.com/files/79578/Ekiga-2.0.5-Denial-Of-Service.html
titleEkiga 2.0.5 Denial Of Service

Redhat

advisories
bugzilla
id292831
titleCVE-2007-4897 ekiga GetHostAddress remote DoS
oval
OR
  • commentRed Hat Enterprise Linux must be installed
    ovaloval:com.redhat.rhba:tst:20070304026
  • AND
    • commentRed Hat Enterprise Linux 5 is installed
      ovaloval:com.redhat.rhba:tst:20070331005
    • OR
      • AND
        • commentpwlib is earlier than 0:1.10.1-7.0.1.el5
          ovaloval:com.redhat.rhsa:tst:20070932001
        • commentpwlib is signed with Red Hat redhatrelease key
          ovaloval:com.redhat.rhsa:tst:20070932002
      • AND
        • commentpwlib-devel is earlier than 0:1.10.1-7.0.1.el5
          ovaloval:com.redhat.rhsa:tst:20070932003
        • commentpwlib-devel is signed with Red Hat redhatrelease key
          ovaloval:com.redhat.rhsa:tst:20070932004
rhsa
idRHSA-2007:0932
released2007-10-08
severityModerate
titleRHSA-2007:0932: pwlib security update (Moderate)
rpms
  • pwlib-0:1.10.1-7.0.1.el5
  • pwlib-debuginfo-0:1.10.1-7.0.1.el5
  • pwlib-devel-0:1.10.1-7.0.1.el5

Seebug

  • bulletinFamilyexploit
    descriptionNo description provided by source.
    idSSV:66737
    last seen2017-11-19
    modified2014-07-01
    published2014-07-01
    reporterRoot
    sourcehttps://www.seebug.org/vuldb/ssvid-66737
    titleEkiga 2.0.5 - (GetHostAddress) Remote Denial of Service Exploit
  • bulletinFamilyexploit
    descriptionNo description provided by source.
    idSSV:12761
    last seen2017-11-19
    modified2009-07-24
    published2009-07-24
    reporterRoot
    sourcehttps://www.seebug.org/vuldb/ssvid-12761
    titleEkiga 2.0.5 (GetHostAddress) Remote Denial of Service Exploit