Vulnerability Scanning Solutions, LLC.
Our Process
What We Scan For
Sample Report
Client List
Contact Us
What We Scan For
Family: Mandrake Local Security Checks --> Category: infos

MDKSA-2004:006-1: gaim Vulnerability Scan

Vulnerability Scan Summary
Check for the version of the gaim package

Detailed Explanation for this Vulnerability Test

The remote host is missing the patch for the advisory MDKSA-2004:006-1 (gaim).

A number of vulnerabilities were discovered in the gaim instant messenger
program by Steffan Esser, versions 0.75 and earlier. Thanks to Jacques A.
Vidrine for providing initial patches.
Multiple buffer overflows exist in gaim 0.75 and earlier: When parsing cookies
in a Yahoo web connection
YMSG protocol overflows parsing the Yahoo login
a YMSG packet overflow
flaws in the URL parser
and flaws in the HTTP
Proxy connect (CAN-2004-006).
A buffer overflow in gaim 0.74 and earlier in the Extract Info Field Function
used for MSN and YMSG protocol handlers (CAN-2004-007).
An integer overflow in gaim 0.74 and earlier, when allocating memory for a
directIM packet results in a heap overflow (CVE-2004-0008).
The patch used to correct the problem was slightly malformed and could cause an
infinite loop and crash with the Yahoo protocol. The new packages have a
corrected patch that resolves the problem.

Solution :
Threat Level: High

Click HERE for more information and discussions on this network vulnerability scan.


P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.