This service will be undergoing maintenance at 00:00 UTC, 2017-10-23 It is expected to last about 30 minutes
Bug 247979 - (CVE-2007-3713) CVE-2007-3713 CenterICQ reportedly vulnerable to multiple buffer overflows
CVE-2007-3713 CenterICQ reportedly vulnerable to multiple buffer overflows
Product: Fedora
Classification: Fedora
Component: centericq (Show other bugs)
All Linux
urgent Severity urgent
: ---
: ---
Assigned To: Andreas Bierfert
Fedora Extras Quality Assurance
: Security
Depends On:
  Show dependency treegraph
Reported: 2007-07-12 10:06 EDT by Lubomir Kundrak
Modified: 2007-11-30 17:12 EST (History)
0 users

See Also:
Fixed In Version: 4.21.0-13.fc7
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2007-07-19 12:46:41 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Lubomir Kundrak 2007-07-12 10:06:51 EDT
Name: CVE-2007-3713
Status: Candidate
Assigned: 20070711
Reference: BID:24854
Reference: URL:

Multiple buffer overflows in Konst CenterICQ 4.9.11 through 4.21 allow
remote attackers to execute arbitrary code via unspecified vectors.
NOTE: the provenance of this information is unknown; the details are
obtained solely from third party information. NOTE: this might overlap
Comment 1 Lubomir Kundrak 2007-07-12 10:07:59 EDT
I believe this is not the same as CVE-2007-0160, but this:
Anyone has a patch?
Comment 2 Lubomir Kundrak 2007-07-18 20:29:44 EDT
Andreas: I've commited and built centericq-4.21.0-13.fc8 with the fix included.
Could you please review it and issue updates for Fedora 6 and 7?
Comment 3 Andreas Bierfert 2007-07-19 09:53:39 EDT
Thanks. I will do it today.
Comment 4 Fedora Update System 2007-07-19 12:46:38 EDT
centericq-4.21.0-13.fc7 has been pushed to the Fedora 7 stable repository.  If problems still persist, please make note of it in this bug report.

Note You need to log in before you can comment on or make changes to this bug.