Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.50562
Category:Mandrake Local Security Checks
Title:Mandrake Security Advisory MDKSA-2004:081 (gaim)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to gaim
announced via advisory MDKSA-2004:081.

Sebastian Krahmer discovered two remotely exploitable buffer overflow
vulnerabilities in the gaim instant messenger. The updated packages
are patched to correct the problems.

Affected versions: 10.0, 9.2

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDKSA-2004:081
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0500

Risk factor : High

CVSS Score:
7.5

Cross-Ref: BugTraq ID: 10865
Common Vulnerability Exposure (CVE) ID: CVE-2004-0500
http://www.securityfocus.com/bid/10865
http://www.fedoranews.org/updates/FEDORA-2004-278.shtml
http://www.fedoranews.org/updates/FEDORA-2004-279.shtml
http://www.gentoo.org/security/en/glsa/glsa-200408-12.xml
http://www.gentoo.org/security/en/glsa/glsa-200408-27.xml
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:081
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9429
http://www.redhat.com/support/errata/RHSA-2004-400.html
SuSE Security Announcement: SUSE-SA:2004:025 (Google Search)
http://www.novell.com/linux/security/advisories/2004_25_gaim.html
XForce ISS Database: gaim-msn-bo(16920)
https://exchange.xforce.ibmcloud.com/vulnerabilities/16920
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.