English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 75096 CVE descriptions
and 39644 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.51855
Category:Conectiva Local Security Checks
Title:Conectiva Security Advisory CLA-2005:933
Summary:Conectiva Security Advisory CLA-2005:933
Description:
The remote host is missing updates announced in
advisory CLA-2005:933.

Gaim[1] is a multi-protocol instant messaging (IM) client.

This announcement fixes three denial of service vulnerabilities that
were encountered in Gaim.

The fixed vulnerabilities are:

CVE-2005-0472[2]: Gaim before 1.1.3 allows remote attackers to cause
a denial of service (infinite loop) via malformed SNAC packets from
AIM or ICQ.

CVE-2005-0473[3]: The HTML parsing functions in Gaim before 1.1.3
allow remote attackers to cause a denial of service (application
crash) via malformed HTML that causes an invalid memory access.

CVE-2005-0208[4]: The HTML parsing functions in Gaim before 1.1.4
allow remote attackers to cause a denial of service (application
crash) via malformed HTML that causes an invalid memory access. This
vulnerabity is diferent from CVE-2005-0473.

For further informations on Gaim's vulnerabilities, please refer to
the project's security page[5].


Solution:
The apt tool can be used to perform RPM package upgrades
by running 'apt-get update' followed by 'apt-get upgrade'

http://gaim.sourceforge.net/
http://gaim.sourceforge.net/security/
http://www.securityspace.com/smysecure/catid.html?in=CLA-2005:933
http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000933

Risk factor : Medium
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2005-0472
Conectiva Linux advisory: CLA-2005:933
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000933
Debian Security Information: DSA-716 (Google Search)
http://www.debian.org/security/2005/dsa-716
http://www.securityfocus.com/archive/1/archive/1/426078/100/0/threaded
http://www.gentoo.org/security/en/glsa/glsa-200503-03.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2005:049
http://www.redhat.com/support/errata/RHSA-2005-215.html
http://www.redhat.com/support/errata/RHSA-2005-432.html
Bugtraq: 20050225 [USN-85-1] Gaim vulnerabilities (Google Search)
http://marc.theaimsgroup.com/?l=bugtraq&m=110935655500670&w=2
SuSE Security Announcement: SUSE-SA:2005:036 (Google Search)
http://www.novell.com/linux/security/advisories/2005_36_sudo.html
CERT/CC vulnerability note: VU#839280
http://www.kb.cert.org/vuls/id/839280
BugTraq ID: 12589
http://www.securityfocus.com/bid/12589
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10433
http://secunia.com/advisories/14322
XForce ISS Database: gaim-snac-dos(19380)
http://xforce.iss.net/xforce/xfdb/19380
Common Vulnerability Exposure (CVE) ID: CVE-2005-0473
CERT/CC vulnerability note: VU#523888
http://www.kb.cert.org/vuls/id/523888
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10212
XForce ISS Database: gaim-html-dos(19381)
http://xforce.iss.net/xforce/xfdb/19381
Common Vulnerability Exposure (CVE) ID: CVE-2005-0208
CERT/CC vulnerability note: VU#795812
http://www.kb.cert.org/vuls/id/795812
BugTraq ID: 12660
http://www.securityfocus.com/bid/12660
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10477
http://secunia.com/advisories/14386
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 39644 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.