![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.52679 |
Category: | Fedora Local Security Checks |
Title: | Fedora Core 3 FEDORA-2005-369 (gaim) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing an update to gaim announced via advisory FEDORA-2005-369. Gaim allows you to talk to anyone using a variety of messaging protocols, including AIM (Oscar and TOC), ICQ, IRC, Yahoo!, MSN Messenger, Jabber, Gadu-Gadu, Napster, and Zephyr. These protocols are implemented using a modular, easy to use design. To use a protocol, just add an account using the account editor. Update Information: Many bug fixes and two important security fixes. * Tue May 10 2005 Warren Togami 1:1.3.0-1 - 1.3.0 many bug fixes and two security fixes long URL crash fix (#157017) CVE-2005-1261 MSN bad messages crash fix (#157202) CVE-2005-1262 * Thu Apr 7 2005 Warren Togami 1:1.2.1-4 - use mozilla-nss everywhere because gnutls is buggy (#135778) This update can be downloaded from: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/ This update can also be installed with the Update Agent you can launch the Update Agent with the 'up2date' command. Solution: Apply the appropriate updates. http://www.fedoranews.org/blog/index.php?p=662 Risk factor : High CVSS Score: 7.5 |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2005-1261 13590 http://www.securityfocus.com/bid/13590 ADV-2005-0519 http://www.vupen.com/english/advisories/2005/0519 FLSA:158543 http://www.securityfocus.com/archive/1/426078/100/0/threaded RHSA-2005:429 http://www.redhat.com/support/errata/RHSA-2005-429.html RHSA-2005:432 http://www.redhat.com/support/errata/RHSA-2005-432.html http://gaim.sourceforge.net/security/index.php?id=16 oval:org.mitre.oval:def:10725 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10725 Common Vulnerability Exposure (CVE) ID: CVE-2005-1262 13591 http://www.securityfocus.com/bid/13591 SUSE-SA:2005:036 http://www.novell.com/linux/security/advisories/2005_36_sudo.html http://gaim.sourceforge.net/security/index.php?id=17 oval:org.mitre.oval:def:10861 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10861 |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |