Vulnerability Scanning Solutions, LLC.
Our Process
What We Scan For
Sample Report
Client List
Contact Us
What We Scan For
Family: Mandrake Local Security Checks --> Category: infos

MDKSA-2005:071: gaim Vulnerability Scan

Vulnerability Scan Summary
Check for the version of the gaim package

Detailed Explanation for this Vulnerability Test

The remote host is missing the patch for the advisory MDKSA-2005:071 (gaim).

More vulnerabilities have been discovered in the gaim instant messaging client:

A buffer overflow vulnerability was found in the way that gaim escapes HTML,
allowing a remote attacker to send a specially crafted message to a gaim client
and causing it to crash (CVE-2005-0965).

A bug was discovered in several of gaim's IRC processing functions that fail to
properly remove various markup tags within an IRC message. This could allow a
remote attacker to send specially crafted message to a gaim client connected to
an IRC server, causing it to crash (CVE-2005-0966).

Finally, a problem was found in gaim's Jabber message parser that would allow a
remote Jabber user to send a specially crafted message to a gaim client,
bausing it to crash (CVE-2005-0967).

Gaim version 1.2.1 is not vulnerable to these issues and is provided with this

Solution :
Threat Level: High

Click HERE for more information and discussions on this network vulnerability scan.


P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.