exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 100 RSS Feed

Files

s21sec-036-en.txt
Posted Sep 13, 2007
Authored by Jose Miguel Esparza | Site s21sec.com

Due to poor memory allocation management, Ekiga versions 2.0.5 and below are susceptible to a denial of service condition.

tags | advisory, denial of service
SHA-256 | f96123da6a4fdf8c6cf9e4c413f57a25dee873f75f0e9569dcef9eb45344294d

Related Files

Ekiga 2.0.5 Denial Of Service
Posted Jul 24, 2009
Authored by Jose Miguel Esparza | Site s21sec.com

Ekiga GetHostAddress remote denial of service exploit.

tags | exploit, remote, denial of service
advisories | CVE-2007-4897
SHA-256 | 7d1d7087dcd522d63e3e4a08b0c680f36f2c28abc0cc5cef8a179d383398b97f
Ubuntu Security Notice 562-1
Posted Jan 9, 2008
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 562-1 - Jose Miguel Esparza discovered that certain SIP headers were not correctly validated. A remote attacker could send a specially crafted packet to an application linked against opal (e.g. Ekiga) causing it to crash, leading to a denial of service.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2007-4924
SHA-256 | 0bae0510745e2d4cc1e920612d25832120f26ff1cd4e53a774b165a882277ed1
Ubuntu Security Notice 561-1
Posted Jan 9, 2008
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 561-1 - Jose Miguel Esparza discovered that pwlib did not correctly handle large string lengths. A remote attacker could send specially crafted packets to applications linked against pwlib (e.g. Ekiga) causing them to crash, leading to a denial of service.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2007-4897
SHA-256 | 52e265988f2840d09d20942061a4e0e7c5807c23b28fec9e912ec1f3f55eedbc
Mandriva Linux Security Advisory 2007.206
Posted Nov 2, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A memory management flaw was discovered in PWLib, that an attacker could use to crash an application linked with it, such as Ekiga.

tags | advisory
systems | linux, mandriva
advisories | CVE-2007-4897
SHA-256 | 3f007f8bc04dd1f3ff6d6688b38f27837784062741bff85a6a37ed5b7d2fc187
Mandriva Linux Security Advisory 2007.205
Posted Nov 2, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A flaw in opal, the Open Phone Abstraction Library, was found in how it handles certain Session Initiation Protocol (SIP) packets. An attacker could use this vulnerability to crash an application linked to opal, such as Ekiga.

tags | advisory, protocol
systems | linux, mandriva
advisories | CVE-2007-4924
SHA-256 | 850f35b9bd001ea6547bb8c871600fc04e5221c92b9fff7729720a2c3eabb963
s21sec-037-en.txt
Posted Oct 12, 2007
Authored by Jose Miguel Esparza | Site s21sec.com

OPAL versions 2.2.8 and below and Ekiga versions 2.0.9 and below suffer from a denial of service condition due to insufficiently validating the Content-Length field of a SIP request.

tags | advisory, denial of service
SHA-256 | 4d364df06d8fbbc07a007d1e0a7b5b491550f9b20da4c09aa796e46c096883f4
Secunia Security Advisory 27128
Posted Oct 8, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Ekiga, which can potentially be exploited by malicious people to compromise an vulnerable system.

tags | advisory
SHA-256 | 417f336b354657c8e1df9af543d78b3409d1cff19bed589346348f878e262627
Gentoo Linux Security Advisory 200703-25
Posted Apr 2, 2007
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200703-25 - Mu Security has discovered that Ekiga fails to implement formatted printing correctly. Versions less than 2.0.7 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2007-1006
SHA-256 | ebfbe3ad37e4cec53357ffaa0a9754510f08a3a4405f3ba9de36ad8d6167c2fe
Secunia Security Advisory 24680
Posted Apr 2, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for ekiga. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, gentoo
SHA-256 | d0c6a8b559f88c80c43e6bfb9cbd6c80cb4be598ed17d7a449de941751645600
Mandriva Linux Security Advisory 2007.058
Posted Mar 13, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A format string flaw was discovered in how ekiga processes certain messages, which could permit a remote attacker that can connect to ekiga to potentially execute arbitrary code with the privileges of the user running ekiga. This is similar to the previous CVE-2007-1006, but the original evaluation/patches were incomplete.

tags | advisory, remote, arbitrary
systems | linux, mandriva
advisories | CVE-2007-0999
SHA-256 | 74059760ca396ac9aaacb0f5ccd2643fd0c6b428319aa2208dfe6b636aa57456
Ubuntu Security Notice 434-1
Posted Mar 13, 2007
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 434-1 - It was discovered that Ekiga had format string vulnerabilities beyond those fixed in USN-426-1. If a user was running Ekiga and listening for incoming calls, a remote attacker could send a crafted call request, and execute arbitrary code with the user's privileges.

tags | advisory, remote, arbitrary, vulnerability
systems | linux, ubuntu
advisories | CVE-2007-0999
SHA-256 | 4bb663bcca02745bd937d2b0350fc4948fe9be30a4b471dbc9b3fe104805a094
Secunia Security Advisory 24379
Posted Mar 5, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for gnomemeeting and ekiga. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, debian
SHA-256 | c9c7a2d88983580cdcb90174fc92ba846b47ece0d6f69430cbe6be0ff2c39c18
Ubuntu Security Notice 426-1
Posted Feb 24, 2007
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 426-1 - Mu Security discovered a format string vulnerability in Ekiga. If a user was running Ekiga and listening for incoming calls, a remote attacker could send a crafted call request, and execute arbitrary code with the user's privileges.

tags | advisory, remote, arbitrary
systems | linux, ubuntu
advisories | CVE-2007-1006, CVE-2007-1007
SHA-256 | a2bd833851d5b49599235e19bbdcfe3342dbf5172b8b1585051a91ff93865253
Mandriva Linux Security Advisory 2007.044
Posted Feb 24, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Security Advisory - A format string flaw was discovered in how ekiga processes certain messages, which could permit a remote attacker that can connect to ekiga to potentially execute arbitrary code with the privileges of the user running ekiga.

tags | advisory, remote, arbitrary
systems | linux, mandriva
advisories | CVE-2007-1006
SHA-256 | 26d6aaa78c29000b479ee56a732674724a936148245f9bba06b92706812a7728
Secunia Security Advisory 24228
Posted Feb 23, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for ekiga. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
systems | linux, fedora
SHA-256 | 609e6bfa95568a0646aa8ab180e31e0e5087618b7a44e42bfe2def3f285c8018
Secunia Security Advisory 24229
Posted Feb 23, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for ekiga. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, mandriva
SHA-256 | d8619f88baa31c58efe61214a919101e1b43045d6a71f2882e373f7408aea810
Secunia Security Advisory 24271
Posted Feb 23, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for ekiga and gnomemeeting. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
systems | linux, ubuntu
SHA-256 | de7c70b99a90c547ec558671c1ef69737f85f3551cea622999b48bd36ce7e4b0
Secunia Security Advisory 24194
Posted Feb 19, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Ekiga, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 90d38e41f26f6c52dbab086962c39df95ba4581f24dad47833185be58db5169a
s_servc.zip
Posted Aug 26, 2002

SunOS 4.1.X exploit for selection_svc hole.

tags | bbs
systems | solaris
SHA-256 | f881f73b40342fc49293188abb3258b0a0aa27b3d54d0326bc389077c534e7ef
S-00-01.asc
Posted Jan 10, 2000

Subject HP Aserver Date 01-Jan-2000

SHA-256 | 354f17770e368ce57ecef520cc687a565e433f1f41b63a2486fa5194539d7bb3
S-00-01.htm
Posted Jan 10, 2000

S-00-01.htm

SHA-256 | 06d3510cefcebf4fd49f0a1aa7d0ec4c01ee0fb8ff53eb451c672a4b42743f6b
S-00-02.asc
Posted Jan 10, 2000

Subject Denial of Service mit Stacheldraht Date 04-Jan-2000

tags | denial of service
SHA-256 | 911a651da0b891df94689db1cf06a27fe11a938d11f9bab3b7d812c1f7564a90
S-00-02.htm
Posted Jan 10, 2000

S-00-02.htm

SHA-256 | c5526e20dd087f27af5edfdcd78e9e4a08a9fc240c8cceb6638b56ea446643d8
S-00-03.asc
Posted Jan 10, 2000

Subject Buffer overflow Miscrosoft MCIS mail server Date 05-Jan-2000

tags | overflow
SHA-256 | 656cd2165da07cbfdb61569dbd725c2eb739fd1de2eed991b04656a49a41270b
S-00-03.htm
Posted Jan 10, 2000

S-00-03.htm

SHA-256 | 40b09d95cf0eb4c1451ad648d84c475962494c541e3228f35296a85e7def670c
Page 1 of 4
Back1234Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    0 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close