CERTA-2003-AVI-200
Vulnerability from certfr_avis

Un vulnérabilité dans la gestion des en-têtes par le lecteur de nouvelles Pan permet à un utilisateur mal intentionné de réaliser un déni de service.

Description

Pan est un lecteur de nouvelles écrit en GTK (The GIMP ToolKit). Une vulnérabilité de type débordement de mémoire dans l'interprétation d'une des en-têtes d'un message permet à un utilisateur mal intentionné de réaliser un déni de service.

Solution

Mettre à jour Pan selon son système d'exploitation (cf. section Documentation).

Toutes les versions de Pan antérieures à la version 0.13.4.

Impacted products
Vendor Product Description
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cp\u003eToutes les versions de Pan ant\u00e9rieures  \u00e0 la version 0.13.4.\u003c/p\u003e",
  "content": "## Description\n\nPan est un lecteur de nouvelles \u00e9crit en GTK (The GIMP ToolKit). Une\nvuln\u00e9rabilit\u00e9 de type d\u00e9bordement de m\u00e9moire dans l\u0027interpr\u00e9tation d\u0027une\ndes en-t\u00eates d\u0027un message permet \u00e0 un utilisateur mal intentionn\u00e9 de\nr\u00e9aliser un d\u00e9ni de service.\n\n## Solution\n\nMettre \u00e0 jour Pan selon son syst\u00e8me d\u0027exploitation (cf. section\nDocumentation).\n",
  "cves": [],
  "initial_release_date": "2003-11-25T00:00:00",
  "last_revision_date": "2003-11-25T00:00:00",
  "links": [
    {
      "title": "Site du lecteur de nouvelles Pan :",
      "url": "http://pan.rebelbase.com"
    }
  ],
  "reference": "CERTA-2003-AVI-200",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2003-11-25T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    }
  ],
  "summary": "Un vuln\u00e9rabilit\u00e9 dans la gestion des en-t\u00eates par le lecteur de\nnouvelles Pan permet \u00e0 un utilisateur mal intentionn\u00e9 de r\u00e9aliser un\nd\u00e9ni de service.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans Pan",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Avis de s\u00e9curit\u00e9 RedHat RHSA-2003:311-06",
      "url": "https://rhn.redhat.com/errata/RHSA-2003-311.html"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…