<<< Date Index >>>     <<< Thread Index >>>

Multiple vulnerabilities in libgadu and ekg package



Multiple vulnerabilities have been found in libgadu, a library for handling Gadu-Gadu instant messaging protocol. It is a part of ekg, a Gadu-Gadu client, but is widely used in other clients. Also some of the user contributed scripts were found to behave in an insecure manner.

Bugs fixed in ekg-1.6rc3:

- integer overflow in libgadu (CAN-2005-1852) that could be triggered by
  an incomming message and lead to application crash and/or remote code
  execution (discovered by Marcin Ślusarz),

Bugs fixed in ekg-1.6rc2:

- insecure file creation in user contributed Python script
  (CAN-2005-1916, discovered by Eric Romang of ZATAZ audit),

- insecure file creation (CAN-2005-1850) and shell command injection
  (CAN-2005-1851) in other user contributed scripts (discovered by
  Marcin Owsiany and Wojtek Kaniewski),

- several signedness errors in libgadu that could be triggered by an
  incomming network data or an application passing invalid user input to
  the library (discovered by Grzegorz Jaśkiewicz),

- memory alignment errors in libgadu that could be triggered by an
  incomming message and lead to bus errors on architectures like SPARC
  (discovered by Szymon Zygmunt and Michał Bartoszkiewicz),

- endianness errors in libgadu that could cause invalid behaviour of
  applications on big-endian architectures (discovered by Marcin
  Ślusarz).

Update is *strongly* recommended. The current version of ekg (including fixed libgadu) can be downloaded from:

  http://dev.null.pl/ekg/ekg-1.6rc3.tar.gz

Note that due to frequent protocol modifications that require API and ABI changes, several Gadu-Gadu clients include libgadu in their source trees and use it as a static library. If you use Gadu-Gadu client based on libgadu other than ekg, please consult your vendor whether an update is necessary.

Regards,
Wojtek Kaniewski