Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: Debian Local Security Checks --> Category: infos

[DSA434] DSA-434-1 gaim Vulnerability Scan


Vulnerability Scan Summary
DSA-434-1 gaim

Detailed Explanation for this Vulnerability Test

Stefan Esser discovered several security related problems in Gaim, a
multi-protocol instant messaging client. Not all of them are
applicable for the version in Debian stable, but affected the version
in the unstable distribution at least. The problems were grouped for
the Common Vulnerabilities and Exposures as follows:
When the Yahoo Messenger handler decodes an octal value for email
notification functions two different kinds of overflows can be
triggered. When the MIME decoder decoded a quoted printable
encoded string for email notification two other different kinds of
overflows can be triggered. These problems only affect the
version in the unstable distribution.
When parsing the cookies within the HTTP reply header of a Yahoo
web connection a buffer overflow can happen. When parsing the
Yahoo Login Webpage the YMSG protocol overflows stack buffers if
the web page returns oversized values. When splitting a URL into
its parts a stack overflow can be caused. These problems only
affect the version in the unstable distribution.
When an oversized keyname is read from a Yahoo Messenger packet a
stack overflow can be triggered. When Gaim is setup to use an HTTP
proxy for connecting to the server a malicious HTTP proxy can
exploit it. These problems affect all versions Debian ships.
However, the connection to Yahoo doesn't work in the version in
Debian stable.
Internally data is copied between two tokens into a fixed size
stack buffer without a size check. This only affects the version
of gaim in the unstable distribution.
When allocating memory for AIM/Oscar DirectIM packets an integer
overflow can happen, resulting in a heap overflow. This only
affects the version of gaim in the unstable distribution.
For the stable distribution (woody) these problems has been fixed in
version 0.58-2.4.
For the unstable distribution (sid) these problems has been fixed in
version 0.75-2.
We recommend that you upgrade your gaim packages.


Solution : http://www.debian.org/security/2004/dsa-434
Threat Level: High

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.