Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.51164
Categoría:Red Hat Local Security Checks
Título:RedHat Security Advisory RHSA-2004:400
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing updates announced in
advisory RHSA-2004:400.

Gaim is an instant messenger client that can handle multiple protocols.

Buffer overflow bugs were found in the Gaim MSN protocol handler. In order
to exploit these bugs, an attacker would have to perform a man in the
middle attack between the MSN server and the vulnerable Gaim client. Such
an attack could allow arbitrary code execution. The Common Vulnerabilities
and Exposures project (cve.mitre.org) has assigned the name CVE-2004-0500
to this issue.

Buffer overflow bugs have been found in the Gaim URL decoder, local
hostname resolver, and the RTF message parser. It is possible that a
remote attacker could send carefully crafted data to a vulnerable client
and lead to a crash or arbitrary code execution. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CVE-2004-0785 to this issue.

A shell escape bug has been found in the Gaim smiley theme file
installation. When a user installs a smiley theme, which is contained
within a tar file, the unarchiving of the data is done in an unsafe manner.
An attacker could create a malicious smiley theme that would execute
arbitrary commands if the theme was installed by the victim. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CVE-2004-0784 to this issue.

An integer overflow bug has been found in the Gaim Groupware message
receiver. It is possible that if a user connects to a malicious server,
an attacker could send carefully crafted data which could lead to arbitrary
code execution on the victims machine. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CVE-2004-0754 to
this issue.

Users of Gaim are advised to upgrade to this updated package which
contains Gaim version 0.82 and is not vulnerable to these issues.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2004-400.html
http://gaim.sourceforge.net/security/?id=0
http://gaim.sourceforge.net/security/?id=1
http://gaim.sourceforge.net/security/?id=2
http://gaim.sourceforge.net/security/?id=3
http://gaim.sourceforge.net/security/?id=4
http://gaim.sourceforge.net/security/?id=5
http://gaim.sourceforge.net/security/?id=6

Risk factor : High

CVSS Score:
7.5

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2004-0500
BugTraq ID: 10865
http://www.securityfocus.com/bid/10865
http://www.fedoranews.org/updates/FEDORA-2004-278.shtml
http://www.fedoranews.org/updates/FEDORA-2004-279.shtml
http://www.gentoo.org/security/en/glsa/glsa-200408-12.xml
http://www.gentoo.org/security/en/glsa/glsa-200408-27.xml
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:081
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9429
http://www.redhat.com/support/errata/RHSA-2004-400.html
SuSE Security Announcement: SUSE-SA:2004:025 (Google Search)
http://www.novell.com/linux/security/advisories/2004_25_gaim.html
XForce ISS Database: gaim-msn-bo(16920)
https://exchange.xforce.ibmcloud.com/vulnerabilities/16920
Common Vulnerability Exposure (CVE) ID: CVE-2004-0754
BugTraq ID: 11056
http://www.securityfocus.com/bid/11056
http://www.osvdb.org/9260
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10220
http://securitytracker.com/id?1011083
http://secunia.com/advisories/12383
http://secunia.com/advisories/12480
http://secunia.com/advisories/13101
XForce ISS Database: gaim-groupware-integer-overflow(17140)
https://exchange.xforce.ibmcloud.com/vulnerabilities/17140
Common Vulnerability Exposure (CVE) ID: CVE-2004-0784
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10008
XForce ISS Database: gaim-smiley-command-execution(17144)
https://exchange.xforce.ibmcloud.com/vulnerabilities/17144
Common Vulnerability Exposure (CVE) ID: CVE-2004-0785
http://www.osvdb.org/9261
http://www.osvdb.org/9262
http://www.osvdb.org/9263
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10907
http://secunia.com/advisories/12929
XForce ISS Database: gaim-hostname-bo(17142)
https://exchange.xforce.ibmcloud.com/vulnerabilities/17142
XForce ISS Database: gaim-rtf-bo(17141)
https://exchange.xforce.ibmcloud.com/vulnerabilities/17141
XForce ISS Database: gaim-url-bo(17143)
https://exchange.xforce.ibmcloud.com/vulnerabilities/17143
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.