Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2004:033

The remote host is missing updates announced in
advisory RHSA-2004:033.

Gaim is an instant messenger client that can handle multiple protocols.

Stefan Esser audited the Gaim source code and found a number of bugs that
have security implications. Due to the nature of instant messaging many of
these bugs require man-in-the-middle attacks between client and server.
However at least one of the buffer overflows could be exploited by an
attacker sending a carefully-constructed malicious message through a server.

The issues include:

Multiple buffer overflows that affect versions of Gaim 0.75 and earlier.
1) When parsing cookies in a Yahoo web connection, 2) YMSG protocol
overflows parsing the Yahoo login webpage, 3) a YMSG packet overflow, 4)
flaws in the URL parser, and 5) flaws in HTTP Proxy connect. The Common
Vulnerabilities and Exposures project ( has assigned the name
CVE-2004-0006 to these issues.

A buffer overflow in Gaim 0.74 and earlier in the Extract Info
Field Function used for MSN and YMSG protocol handlers. The Common
Vulnerabilities and Exposures project ( has
assigned the name CVE-2004-0007 to this issue.

An integer overflow in Gaim 0.74 and earlier, when allocating
memory for a directIM packet results in heap overflow.
The Common Vulnerabilities and Exposures project ( has
assigned the name CVE-2004-0008 to this issue.

All users of Gaim should upgrade to these erratum packages, which contain
backported security patches correcting these issues.

Red Hat would like to thank Steffan Esser for finding and reporting these
issues and Jacques A. Vidrine for providing initial patches.

Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

Risk factor : High

CVSS Score:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2004-0006
BugTraq ID: 9489
Bugtraq: 20040126 Advisory 01/2004: 12 x Gaim remote overflows (Google Search)
Bugtraq: 20040127 Ultramagnetic Advisory #001: Multiple vulnerabilities in Gaim code (Google Search)
CERT/CC vulnerability note: VU#297198
CERT/CC vulnerability note: VU#371382
CERT/CC vulnerability note: VU#444158
CERT/CC vulnerability note: VU#503030
CERT/CC vulnerability note: VU#527142
CERT/CC vulnerability note: VU#871838
Conectiva Linux advisory: CLA-2004:813
Debian Security Information: DSA-434 (Google Search)
SGI Security Advisory: 20040201-01-U
SGI Security Advisory: 20040202-01-U
SuSE Security Announcement: SuSE-SA:2004:004 (Google Search)
XForce ISS Database: gaim-http-proxy-bo(14947)
XForce ISS Database: gaim-login-name-bo(14940)
XForce ISS Database: gaim-login-value-bo(14941)
XForce ISS Database: gaim-urlparser-bo(14945)
XForce ISS Database: gaim-yahoopacketread-keyname-bo(14943)
XForce ISS Database: gaim-yahoowebpending-cookie-bo(14939)
Common Vulnerability Exposure (CVE) ID: CVE-2004-0007
CERT/CC vulnerability note: VU#197142
XForce ISS Database: gaim-extractinfo-bo(14946)
Common Vulnerability Exposure (CVE) ID: CVE-2004-0008
Bugtraq: 20040127 [slackware-security] GAIM security update (SSA:2004-026-01) (Google Search)
CERT/CC vulnerability note: VU#779614
XForce ISS Database: gaim-directim-bo(14937)
CopyrightCopyright (c) 2005 E-Soft Inc.

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.