Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.55048
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-168-1 (gaim)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to gaim
announced via advisory USN-168-1.

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)

The following packages are affected: gaim

Daniel Atallah discovered a Denial of Service vulnerability in the
file transfer handler of OSCAR (the module that handles various
instant messaging protocols like ICQ). A remote attacker could crash
the Gaim client of an user by attempting to send him a file with
a name that contains invalid UTF-8 characters. (CVE-2005-2102)

It was found that specially crafted away messages triggered a buffer
overflow. A remote attacker could exploit this to crash the Gaim
client or possibly even execute arbitrary code with the permissions of
the Gaim user. (CVE-2005-2103)

Szymon Zygmunt and Michał Bartoszkiewicz discovered a memory alignment
error in the Gadu library, which was fixed in USN-162-1. However, it
was discovered that Gaim contains a copy of the vulnerable code. By
sending specially crafted messages over the Gadu protocol, a remote
attacker could crash Gaim. (CVE-2005-2370)

Solution:
The problem can be corrected by upgrading the affected package to
version 1:1.0.0-1ubuntu1.8 (for Ubuntu 4.10), or 1:1.1.4-1ubuntu4.4
(for Ubuntu 5.04). After performing a standard system upgrade you
need to restart Gaim to effect the necessary changes.

http://www.securityspace.com/smysecure/catid.html?in=USN-168-1

Risk factor : High

CVSS Score:
7.5

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2005-2102
14531
http://www.securityfocus.com/bid/14531
FLSA:158543
http://www.securityfocus.com/archive/1/426078/100/0/threaded
RHSA-2005:627
http://www.redhat.com/support/errata/RHSA-2005-627.html
SUSE-SR:2005:019
http://www.novell.com/linux/security/advisories/2005_19_sr.html
USN-168-1
https://usn.ubuntu.com/168-1/
http://gaim.sourceforge.net/security/?id=21
oval:org.mitre.oval:def:9283
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9283
Common Vulnerability Exposure (CVE) ID: CVE-2005-2103
RHSA-2005:589
http://www.redhat.com/support/errata/RHSA-2005-589.html
http://gaim.sourceforge.net/security/?id=22
oval:org.mitre.oval:def:11477
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11477
Common Vulnerability Exposure (CVE) ID: CVE-2005-2370
BugTraq ID: 24600
http://www.securityfocus.com/bid/24600
Bugtraq: 20050721 Multiple vulnerabilities in libgadu and ekg package (Google Search)
http://marc.info/?l=bugtraq&m=112198499417250&w=2
Debian Security Information: DSA-1318 (Google Search)
http://www.debian.org/security/2007/dsa-1318
Debian Security Information: DSA-813 (Google Search)
http://www.debian.org/security/2005/dsa-813
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10456
http://secunia.com/advisories/16265
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.