Name | CVE-2008-4776 |
Description | libgadu before 1.8.2 allows remote servers to cause a denial of service (crash) via a contact description with a large length, which triggers a buffer over-read. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-1664-1 |
Debian Bugs | 503916, 504429, 559782 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
ekg (PTS) | jessie | 1:1.9~pre+r2855-2 | fixed |
| stretch | 1:1.9~pre+r2855-5 | fixed |
kadu (PTS) | jessie | 1.2-2 | fixed |
| stretch | 4.1-1 | fixed |
| buster | 4.1-1.1 | fixed |
libgadu (PTS) | jessie | 1:1.12.0-5 | fixed |
| stretch | 1:1.12.1-4 | fixed |
| buster | 1:1.12.2-3 | fixed |
| bullseye | 1:1.12.2-5 | fixed |
| bookworm | 1:1.12.2-6 | fixed |
| sid, trixie | 1:1.12.2-6.1 | fixed |
qutecom (PTS) | jessie | 2.2.1+dfsg1-5.2 | fixed |
The information below is based on the following data on fixed versions.
Notes
[lenny] - centerim <no-dsa> (Minor issue)
claimed to be fixed in point update but is not: [lenny] - centerim 4.22.5-1+lenny1
- qutecom <not-affected> (does not use libgadu embed; bug #559784)