Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.55016
Categoría:Red Hat Local Security Checks
Título:RedHat Security Advisory RHSA-2005:589
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing updates announced in
advisory RHSA-2005:589.

Gaim is an Internet Instant Messaging client.

A heap based buffer overflow issue was discovered in the way Gaim processes
away messages. A remote attacker could send a specially crafted away
message to a Gaim user logged into AIM or ICQ which could result in
arbitrary code execution. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CVE-2005-2103 to this issue.

Users of gaim are advised to upgrade to this updated package, which
contains backported patches and is not vulnerable to this issue.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2005-589.html

Risk factor : High

CVSS Score:
7.5

Referencia Cruzada: BugTraq ID: 14531
Common Vulnerability Exposure (CVE) ID: CVE-2005-2103
14531
http://www.securityfocus.com/bid/14531
FLSA:158543
http://www.securityfocus.com/archive/1/426078/100/0/threaded
RHSA-2005:589
http://www.redhat.com/support/errata/RHSA-2005-589.html
RHSA-2005:627
http://www.redhat.com/support/errata/RHSA-2005-627.html
SUSE-SR:2005:019
http://www.novell.com/linux/security/advisories/2005_19_sr.html
USN-168-1
https://usn.ubuntu.com/168-1/
http://gaim.sourceforge.net/security/?id=22
oval:org.mitre.oval:def:11477
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11477
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.