CERTA-2003-AVI-200

Vulnerability from certfr_avis - Published: - Updated:

Un vulnérabilité dans la gestion des en-têtes par le lecteur de nouvelles Pan permet à un utilisateur mal intentionné de réaliser un déni de service.

Description

Pan est un lecteur de nouvelles écrit en GTK (The GIMP ToolKit). Une vulnérabilité de type débordement de mémoire dans l'interprétation d'une des en-têtes d'un message permet à un utilisateur mal intentionné de réaliser un déni de service.

Solution

Mettre à jour Pan selon son système d'exploitation (cf. section Documentation).

Toutes les versions de Pan antérieures à la version 0.13.4.

Impacted products
Vendor Product Description
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cp\u003eToutes les versions de Pan ant\u00e9rieures  \u00e0 la version 0.13.4.\u003c/p\u003e",
  "content": "## Description\n\nPan est un lecteur de nouvelles \u00e9crit en GTK (The GIMP ToolKit). Une\nvuln\u00e9rabilit\u00e9 de type d\u00e9bordement de m\u00e9moire dans l\u0027interpr\u00e9tation d\u0027une\ndes en-t\u00eates d\u0027un message permet \u00e0 un utilisateur mal intentionn\u00e9 de\nr\u00e9aliser un d\u00e9ni de service.\n\n## Solution\n\nMettre \u00e0 jour Pan selon son syst\u00e8me d\u0027exploitation (cf. section\nDocumentation).\n",
  "cves": [],
  "links": [
    {
      "title": "Site du lecteur de nouvelles Pan :",
      "url": "http://pan.rebelbase.com"
    }
  ],
  "reference": "CERTA-2003-AVI-200",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2003-11-25T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    }
  ],
  "summary": "Un vuln\u00e9rabilit\u00e9 dans la gestion des en-t\u00eates par le lecteur de\nnouvelles Pan permet \u00e0 un utilisateur mal intentionn\u00e9 de r\u00e9aliser un\nd\u00e9ni de service.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans Pan",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Avis de s\u00e9curit\u00e9 RedHat RHSA-2003:311-06",
      "url": "https://rhn.redhat.com/errata/RHSA-2003-311.html"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…