Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.50599
Category:Mandrake Local Security Checks
Title:Mandrake Security Advisory MDKSA-2004:117 (gaim)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to gaim
announced via advisory MDKSA-2004:117.

A vulnerability in the MSN protocol handler in the gaim instant
messenger application was discovered. When receiving unexpected
sequences of MSNSLP messages, it is possible that an attacker could
trigger an internal buffer overflow which could lead to a crash or
even code execution as the user running gaim.

The updated packages are patched to fix this problem. This problem
does not affect Mandrakelinux 10.0 installations.

Affected versions: 10.1

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDKSA-2004:117
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0891

Risk factor : Critical

CVSS Score:
10.0

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2004-0891
https://bugzilla.fedora.us/show_bug.cgi?id=2188
http://www.gentoo.org/security/en/glsa/glsa-200410-23.xml
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11790
http://www.redhat.com/support/errata/RHSA-2004-604.html
https://www.ubuntu.com/usn/usn-8-1/
XForce ISS Database: gaim-file-transfer-dos(17790)
https://exchange.xforce.ibmcloud.com/vulnerabilities/17790
XForce ISS Database: gaim-msn-slp-bo(17786)
https://exchange.xforce.ibmcloud.com/vulnerabilities/17786
XForce ISS Database: gaim-msn-slp-dos(17787)
https://exchange.xforce.ibmcloud.com/vulnerabilities/17787
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.