Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: Gentoo Local Security Checks --> Category: infos

[GLSA-200408-12] Gaim: MSN protocol parsing function buffer overflow Vulnerability Scan


Vulnerability Scan Summary
Gaim: MSN protocol parsing function buffer overflow

Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200408-12
(Gaim: MSN protocol parsing function buffer overflow)


Sebastian Krahmer of the SuSE Security Team has discovered a remotely
exploitable buffer overflow vulnerability in the code handling MSN protocol
parsing.

Impact

By sending a carefully-crafted message, a possible hacker may execute arbitrary
code with the permissions of the user running Gaim.

Workaround

There is no known workaround at this time. All users are encouraged to
upgrade to the latest available version of Gaim.

References:
http://www.osvdb.org/displayvuln.php?osvdb_id=8382


Solution:
All Gaim users should upgrade to the latest version:
# emerge sync
# emerge -pv ">=net-im/gaim-0.81-r1"
# emerge ">=net-im/gaim-0.81-r1"


Threat Level: Medium


Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.