ALT-PU-2014-1968-1
Closed vulnerabilities
Published: 2014-05-22
BDU:2015-04123
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Severity: HIGH (7.5)
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
References:
Published: 2014-10-10
Modified: 2025-04-12
Modified: 2025-04-12
CVE-2013-4488
libgadu before 1.12.0 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers.
Severity: MEDIUM (4.3)
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
References:
- http://www.mail-archive.com/libgadu-devel%40lists.ziew.org/msg01017.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:185
- http://www.openwall.com/lists/oss-security/2013/10/31/5
- http://www.securityfocus.com/bid/63473
- https://bugzilla.redhat.com/show_bug.cgi?id=1025718
- https://lists.fedoraproject.org/pipermail/package-announce/2013-December/125143.html
- https://security.gentoo.org/glsa/201508-02
- http://www.mail-archive.com/libgadu-devel%40lists.ziew.org/msg01017.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:185
- http://www.openwall.com/lists/oss-security/2013/10/31/5
- http://www.securityfocus.com/bid/63473
- https://bugzilla.redhat.com/show_bug.cgi?id=1025718
- https://lists.fedoraproject.org/pipermail/package-announce/2013-December/125143.html
- https://security.gentoo.org/glsa/201508-02
Published: 2014-05-22
Modified: 2025-04-12
Modified: 2025-04-12
CVE-2014-3775
libgadu before 1.11.4 and 1.12.0 before 1.12.0-rc3, as used in Pidgin and other products, allows remote Gadu-Gadu file relay servers to cause a denial of service (memory overwrite) or possibly execute arbitrary code via a crafted message.
Severity: HIGH (7.5)
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
References:
- http://lists.ziew.org/pipermail/libgadu-devel/2014-May/001171.html
- http://lists.ziew.org/pipermail/libgadu-devel/2014-May/001180.html
- http://secunia.com/advisories/58668
- http://secunia.com/advisories/58870
- http://secunia.com/advisories/58871
- http://www.debian.org/security/2014/dsa-2935
- http://www.openwall.com/lists/oss-security/2014/05/19/3
- http://www.securityfocus.com/bid/67471
- http://www.ubuntu.com/usn/USN-2215-1
- http://www.ubuntu.com/usn/USN-2216-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1099776
- https://security.gentoo.org/glsa/201508-02
- http://lists.ziew.org/pipermail/libgadu-devel/2014-May/001171.html
- http://lists.ziew.org/pipermail/libgadu-devel/2014-May/001180.html
- http://secunia.com/advisories/58668
- http://secunia.com/advisories/58870
- http://secunia.com/advisories/58871
- http://www.debian.org/security/2014/dsa-2935
- http://www.openwall.com/lists/oss-security/2014/05/19/3
- http://www.securityfocus.com/bid/67471
- http://www.ubuntu.com/usn/USN-2215-1
- http://www.ubuntu.com/usn/USN-2216-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1099776
- https://security.gentoo.org/glsa/201508-02