Ekiga GM_Main_Window_Flash_Message Remote Format String Vulnerability
BID:22613
Info
Ekiga GM_Main_Window_Flash_Message Remote Format String Vulnerability
| Bugtraq ID: | 22613 |
| Class: | Input Validation Error |
| CVE: |
CVE-2007-1007 CVE-2007-1006 |
| Remote: | Yes |
| Local: | No |
| Published: | Feb 19 2007 12:00AM |
| Updated: | Nov 15 2007 12:36AM |
| Credit: | The vendor reported this issue. |
| Vulnerable: |
Ubuntu Ubuntu Linux 5.10 sparc Ubuntu Ubuntu Linux 5.10 powerpc Ubuntu Ubuntu Linux 5.10 i386 Ubuntu Ubuntu Linux 5.10 amd64 Ubuntu Ubuntu Linux 6.10 sparc Ubuntu Ubuntu Linux 6.10 powerpc Ubuntu Ubuntu Linux 6.10 i386 Ubuntu Ubuntu Linux 6.10 amd64 Ubuntu Ubuntu Linux 6.06 LTS sparc Ubuntu Ubuntu Linux 6.06 LTS powerpc Ubuntu Ubuntu Linux 6.06 LTS i386 Ubuntu Ubuntu Linux 6.06 LTS amd64 SuSE SUSE Linux Enterprise Server SDK 9 SuSE SUSE Linux Enterprise Server 9 SP3 SuSE SUSE Linux Enterprise Server 10 SuSE SUSE Linux Enterprise SDK 9 SuSE SUSE Linux Enterprise SDK 10 SuSE SUSE Linux Enterprise SDK 10 SuSE SUSE Linux Enterprise Desktop 10 SuSE Linux Professional 10.2 x86_64 SuSE Linux Personal 10.2 x86_64 SGI ProPack 3.0 SP6 S.u.S.E. UnitedLinux 1.0 S.u.S.E. SuSE Linux Standard Server 8.0 S.u.S.E. SuSE Linux School Server for i386 S.u.S.E. SUSE LINUX Retail Solution 8.0 S.u.S.E. SuSE Linux Openexchange Server 4.0 S.u.S.E. SuSE Linux Open-Xchange 4.1 S.u.S.E. openSUSE 10.2 S.u.S.E. Open-Enterprise-Server 9.0 S.u.S.E. Open-Enterprise-Server 1 S.u.S.E. Open-Enterprise-Server 0 S.u.S.E. Office Server S.u.S.E. Novell Linux POS 9 S.u.S.E. Novell Linux Desktop 9.0 S.u.S.E. Novell Linux Desktop 1.0 S.u.S.E. Novell Linux Desktop 9 S.u.S.E. Linux Professional 10.0 OSS S.u.S.E. Linux Professional 10.0 S.u.S.E. Linux Professional 9.3 x86_64 S.u.S.E. Linux Professional 9.3 S.u.S.E. Linux Professional 10.2 S.u.S.E. Linux Professional 10.1 S.u.S.E. Linux Personal 10.0 OSS S.u.S.E. Linux Personal 9.3 x86_64 S.u.S.E. Linux Personal 9.3 S.u.S.E. Linux Personal 10.2 S.u.S.E. Linux Personal 10.1 S.u.S.E. Linux Openexchange Server S.u.S.E. Linux Office Server S.u.S.E. Linux Enterprise Server for S/390 9.0 S.u.S.E. Linux Enterprise Server for S/390 S.u.S.E. Linux Enterprise Server 9-SP3 S.u.S.E. Linux Enterprise Server 10 S.u.S.E. Linux Desktop 10 S.u.S.E. Linux Database Server 0 S.u.S.E. Linux Connectivity Server S.u.S.E. Linux 10.1 x86-64 S.u.S.E. Linux 10.1 x86 S.u.S.E. Linux 10.1 ppc S.u.S.E. Linux 10.0 x86-64 S.u.S.E. Linux 10.0 x86 S.u.S.E. Linux 10.0 ppc RedHat Enterprise Linux WS 4 RedHat Enterprise Linux WS 3 RedHat Enterprise Linux Optional Productivity Application 5 server RedHat Enterprise Linux ES 4 RedHat Enterprise Linux ES 3 RedHat Desktop 4.0 RedHat Desktop 3.0 Red Hat Fedora Core6 Red Hat Fedora Core5 Red Hat Enterprise Linux Desktop 5 client Red Hat Enterprise Linux AS 4 Red Hat Enterprise Linux AS 3 Mandriva Linux Mandrake 2007.0 x86_64 Mandriva Linux Mandrake 2007.0 MandrakeSoft Corporate Server 3.0 x86_64 MandrakeSoft Corporate Server 3.0 Gentoo Linux Ekiga Gnomemeeting 2.0 Ekiga Gnomemeeting 1.2.2 Ekiga Gnomemeeting 0.98.5 Ekiga Gnomemeeting 0.96 Ekiga Ekiga 2.0.4 Ekiga Ekiga 2.0.3 Ekiga Ekiga 2.0.2 Ekiga Ekiga 2.0.1 Debian Linux 3.1 sparc Debian Linux 3.1 s/390 Debian Linux 3.1 ppc Debian Linux 3.1 mipsel Debian Linux 3.1 mips Debian Linux 3.1 m68k Debian Linux 3.1 ia-64 Debian Linux 3.1 ia-32 Debian Linux 3.1 hppa Debian Linux 3.1 arm Debian Linux 3.1 amd64 Debian Linux 3.1 alpha Debian Linux 3.1 |
| Not Vulnerable: |
Ekiga Ekiga 2.0.5 |
Discussion
Ekiga GM_Main_Window_Flash_Message Remote Format String Vulnerability
Ekiga is prone to a remote format-string vulnerability because the application fails to properly sanitize user-supplied input before including it in the format-specifier argument of a formatted-printing function.
A remote attacker may execute arbitrary code with the privileges of the currently logged-in user. Failed exploit attempts will result in a denial of service.
This issue affects versions prior to 2.0.5.
Ekiga is prone to a remote format-string vulnerability because the application fails to properly sanitize user-supplied input before including it in the format-specifier argument of a formatted-printing function.
A remote attacker may execute arbitrary code with the privileges of the currently logged-in user. Failed exploit attempts will result in a denial of service.
This issue affects versions prior to 2.0.5.
Exploit / POC
Ekiga GM_Main_Window_Flash_Message Remote Format String Vulnerability
Currently we are not aware of any exploits for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Currently we are not aware of any exploits for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution / Fix
Ekiga GM_Main_Window_Flash_Message Remote Format String Vulnerability
Solution:
The vendor has released a patch to address this issue. Please see the references for more information.
Ubuntu Ubuntu Linux 6.10 powerpc
Ubuntu Ubuntu Linux 6.06 LTS sparc
Red Hat Fedora Core6
Ubuntu Ubuntu Linux 6.10 sparc
Red Hat Fedora Core5
Ubuntu Ubuntu Linux 6.10 i386
Ubuntu Ubuntu Linux 6.10 amd64
Ubuntu Ubuntu Linux 6.06 LTS powerpc
Mandriva Linux Mandrake 2007.0
Ubuntu Ubuntu Linux 6.06 LTS i386
Ubuntu Ubuntu Linux 6.06 LTS amd64
Ekiga Gnomemeeting 0.98.5
Ekiga Gnomemeeting 1.2.2
Ekiga Ekiga 2.0.1
Ekiga Ekiga 2.0.2
Ubuntu Ubuntu Linux 5.10 powerpc
Ubuntu Ubuntu Linux 5.10 sparc
Ubuntu Ubuntu Linux 5.10 amd64
Solution:
The vendor has released a patch to address this issue. Please see the references for more information.
Ubuntu Ubuntu Linux 6.10 powerpc
-
Ubuntu ekiga_2.0.3-0ubuntu3.1_powerpc.deb
Ubuntu 6.10:
http://security.ubuntu.com/ubuntu/pool/main/e/ekiga/ekiga_2.0.3-0ubunt u3.1_powerpc.deb
Ubuntu Ubuntu Linux 6.06 LTS sparc
-
Ubuntu ekiga_2.0.1-0ubuntu6.1_sparc.deb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/main/e/ekiga/ekiga_2.0.1-0ubunt u6.1_sparc.deb
Red Hat Fedora Core6
-
RedHat ekiga-2.0.5-2.fc6.i386.rpm
Fedora Core 6
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/6/ -
RedHat ekiga-2.0.5-2.fc6.ppc.rpm
Fedora Core 6
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/6/ -
RedHat ekiga-2.0.5-2.fc6.src.rpm
Fedora Core 6
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/6/ -
RedHat ekiga-2.0.5-2.fc6.x86_64.rpm
Fedora Core 6
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/6/ -
RedHat ekiga-debuginfo-2.0.5-2.fc6.i386.rpm
Fedora Core 6
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/6/ -
RedHat ekiga-debuginfo-2.0.5-2.fc6.ppc.rpm
Fedora Core 6
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/6/ -
RedHat ekiga-debuginfo-2.0.5-2.fc6.x86_64.rpm
Fedora Core 6
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/6/
Ubuntu Ubuntu Linux 6.10 sparc
-
Ubuntu ekiga_2.0.3-0ubuntu3.1_sparc.deb
Ubuntu 6.10:
http://security.ubuntu.com/ubuntu/pool/main/e/ekiga/ekiga_2.0.3-0ubunt u3.1_sparc.deb
Red Hat Fedora Core5
-
RedHat ekiga-2.0.1-4.i386.rpm
Fedora Core 5
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/5/ -
RedHat ekiga-2.0.1-4.ppc.rpm
Fedora Core 5
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/5/ -
RedHat ekiga-2.0.1-4.src.rpm
Fedora Core 5
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/5/ -
RedHat ekiga-2.0.1-4.x86_64.rpm
Fedora Core 5
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/5/ -
RedHat ekiga-debuginfo-2.0.1-4.i386.rpm
Fedora Core 5
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/5/ -
RedHat ekiga-debuginfo-2.0.1-4.ppc.rpm
Fedora Core 5
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/5/ -
RedHat ekiga-debuginfo-2.0.1-4.x86_64.rpm
Fedora Core 5
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/5/
Ubuntu Ubuntu Linux 6.10 i386
-
Ubuntu ekiga_2.0.3-0ubuntu3.1_i386.deb
Ubuntu 6.10:
http://security.ubuntu.com/ubuntu/pool/main/e/ekiga/ekiga_2.0.3-0ubunt u3.1_i386.deb
Ubuntu Ubuntu Linux 6.10 amd64
-
Ubuntu ekiga_2.0.3-0ubuntu3.1_amd64.deb
Ubuntu 6.10:
http://security.ubuntu.com/ubuntu/pool/main/e/ekiga/ekiga_2.0.3-0ubunt u3.1_amd64.deb
Ubuntu Ubuntu Linux 6.06 LTS powerpc
-
Ubuntu ekiga_2.0.1-0ubuntu6.1_powerpc.deb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/main/e/ekiga/ekiga_2.0.1-0ubunt u6.1_powerpc.deb
Mandriva Linux Mandrake 2007.0
-
Mandriva ekiga-2.0.3-1.1mdv2007.0.i586.rpm
Mandriva Linux 2007.0:
http://www.mandriva.com/en/download -
Mandriva ekiga-2.0.3-1.1mdv2007.0.src.rpm
Mandriva Linux 2007.0:
http://www.mandriva.com/en/download
Ubuntu Ubuntu Linux 6.06 LTS i386
-
Ubuntu ekiga_2.0.1-0ubuntu6.1_i386.deb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/main/e/ekiga/ekiga_2.0.1-0ubunt u6.1_i386.deb
Ubuntu Ubuntu Linux 6.06 LTS amd64
-
Ubuntu ekiga_2.0.1-0ubuntu6.1_amd64.deb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/main/e/ekiga/ekiga_2.0.1-0ubunt u6.1_amd64.deb
Ekiga Gnomemeeting 0.98.5
-
Mandriva gnomemeeting-0.98.5-5.1.C30mdk.i586.rpm
Corporate 3.0:
http://www.mandriva.com/en/download -
Mandriva gnomemeeting-0.98.5-5.1.C30mdk.x86_64.rpm
Corporate 3.0:
http://www.mandriva.com/en/download
Ekiga Gnomemeeting 1.2.2
-
Ubuntu gnomemeeting_1.2.2-1ubuntu1.1_amd64.deb
Ubuntu 5.10:
http://security.ubuntu.com/ubuntu/pool/main/g/gnomemeeting/gnomemeetin g_1.2.2-1ubuntu1.1_amd64.deb -
Ubuntu gnomemeeting_1.2.2-1ubuntu1.1_i386.deb
Ubuntu 5.10:
http://security.ubuntu.com/ubuntu/pool/main/g/gnomemeeting/gnomemeetin g_1.2.2-1ubuntu1.1_i386.deb -
Ubuntu gnomemeeting_1.2.2-1ubuntu1.1_powerpc.deb
Ubuntu 5.10:
http://security.ubuntu.com/ubuntu/pool/main/g/gnomemeeting/gnomemeetin g_1.2.2-1ubuntu1.1_powerpc.deb -
Ubuntu gnomemeeting_1.2.2-1ubuntu1.1_sparc.deb
Ubuntu 5.10:
http://security.ubuntu.com/ubuntu/pool/main/g/gnomemeeting/gnomemeetin g_1.2.2-1ubuntu1.1_sparc.deb
Ekiga Ekiga 2.0.1
-
RedHat ekiga-2.0.1-5.i386.rpm
Fedora Core 5
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/5/ -
RedHat ekiga-2.0.1-5.ppc.rpm
Fedora Core 5
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/5/ -
RedHat ekiga-2.0.1-5.src.rpm
Fedora Core 5
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/5/ -
RedHat ekiga-2.0.1-5.x86_64.rpm
Fedora Core 5
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/5/ -
RedHat ekiga-debuginfo-2.0.1-5.i386.rpm
Fedora Core 5
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/5/ -
RedHat ekiga-debuginfo-2.0.1-5.ppc.rpm
Fedora Core 5
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/5/ -
RedHat ekiga-debuginfo-2.0.1-5.x86_64.rpm
Fedora Core 5
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/5/ -
RedHat Fedora ekiga-2.0.1-4.ppc.rpm
Fedora Core 5
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/5/ -
RedHat Fedora ekiga-2.0.1-4.x86_64.rpm
Fedora Core 5
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/5/ -
RedHat Fedora ekiga-debuginfo-2.0.1-4.i386.rpm
Fedora Core 5
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/5/ -
RedHat Fedora ekiga-debuginfo-2.0.1-4.ppc.rpm
Fedora Core 5
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/5/ -
RedHat Fedora ekiga-debuginfo-2.0.1-4.x86_64.rpm
Fedora Core 5
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/5/ -
Ubuntu ekiga_2.0.1-0ubuntu6.1_amd64.deb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/main/e/ekiga/ekiga_2.0.1-0ubunt u6.1_amd64.deb -
Ubuntu ekiga_2.0.1-0ubuntu6.1_i386.deb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/main/e/ekiga/ekiga_2.0.1-0ubunt u6.1_i386.deb -
Ubuntu ekiga_2.0.1-0ubuntu6.1_powerpc.deb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/main/e/ekiga/ekiga_2.0.1-0ubunt u6.1_powerpc.deb -
Ubuntu ekiga_2.0.1-0ubuntu6.1_sparc.deb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/main/e/ekiga/ekiga_2.0.1-0ubunt u6.1_sparc.deb
Ekiga Ekiga 2.0.2
-
RedHat Fedora ekiga-2.0.5-2.fc6.i386.rpm
Fedora Core 6
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/6/ -
RedHat Fedora ekiga-2.0.5-2.fc6.ppc.rpm
Fedora Core 6
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/6/ -
RedHat Fedora ekiga-2.0.5-2.fc6.x86_64.rpm
Fedora Core 6
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/6/ -
RedHat Fedora ekiga-debuginfo-2.0.5-2.fc6.i386.rpm
Fedora Core 6
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/6/ -
RedHat Fedora ekiga-debuginfo-2.0.5-2.fc6.ppc.rpm
Fedora Core 6
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/6/ -
RedHat Fedora ekiga-debuginfo-2.0.5-2.fc6.x86_64.rpm
Fedora Core 6
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/6/
Ubuntu Ubuntu Linux 5.10 powerpc
-
Ubuntu gnomemeeting_1.2.2-1ubuntu1.1_powerpc.deb
Ubuntu 5.10:
http://security.ubuntu.com/ubuntu/pool/main/g/gnomemeeting/gnomemeetin g_1.2.2-1ubuntu1.1_powerpc.deb
Ubuntu Ubuntu Linux 5.10 sparc
-
Ubuntu gnomemeeting_1.2.2-1ubuntu1.1_sparc.deb
Ubuntu 5.10:
http://security.ubuntu.com/ubuntu/pool/main/g/gnomemeeting/gnomemeetin g_1.2.2-1ubuntu1.1_sparc.deb
Ubuntu Ubuntu Linux 5.10 amd64
-
Ubuntu gnomemeeting_1.2.2-1ubuntu1.1_amd64.deb
Ubuntu 5.10:
http://security.ubuntu.com/ubuntu/pool/main/g/gnomemeeting/gnomemeetin g_1.2.2-1ubuntu1.1_amd64.deb
References
Ekiga GM_Main_Window_Flash_Message Remote Format String Vulnerability
References:
References:
- Ekiga Changelog Version 2.0.5 (Ekiga)
- Ekiga Homepage (Ekiga)
- RHSA-2007:0086-3 - gnomemeeting security update (Red Hat)
- RHSA-2007:0087-6 ekiga security update (Red Hat)