Beschreibung: | Description:
The remote host is missing updates announced in advisory CLA-2004:884.
Gaim[1] is a multi-protocol instant messaging (IM) client.
This announcement fixes several denial of service and buffer overflow vulnerabilities that were encountered in Gaim.
The fixed vulnerabilities are:
CVE-2004-0500[2]: Buffer overflow in the MSN protocol plugins object.c and slp.c allows remote attackers to cause a denial of service and possibly execute arbitrary code via MSNSLP protocol messages that are not properly handled in a strncpy call.
CVE-2004-0754[3]: Integer overflow in Gaim allows remote attackers to cause a denial of service and possibly execute arbitrary code via the size variable in Groupware server messages.
CVE-2004-0784[4]: The smiley theme functionality in Gaim allows remote attackers to execute arbitrary commands via shell metacharacters in the filename of the tar file that is dragged to the smiley selector.
CVE-2004-0785[5]: Multiple buffer overflows in Gaim allow remote attackers to cause a denial of service and possibly execute arbitrary code via Rich Text Format (RTF) messages, a long hostname for the local system as obtained from DNS, or a long URL that is not properly handled by the URL decoder.
For further informations on Gaim's vulnerabilities, please refer to the project's security page[6].
Solution: The apt tool can be used to perform RPM package upgrades by running 'apt-get update' followed by 'apt-get upgrade'
http://gaim.sourceforge.net/ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0500 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0754 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0784 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0785 http://gaim.sourceforge.net/security/ http://www.securityspace.com/smysecure/catid.html?in=CLA-2004:884 http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=002004
Risk factor : High
CVSS Score: 7.5
|