|
Family: Gentoo Local Security Checks --> Category: infos
[GLSA-200408-12] Gaim: MSN protocol parsing function buffer overflow Vulnerability Scan
Vulnerability Scan Summary Gaim: MSN protocol parsing function buffer overflow
Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200408-12
(Gaim: MSN protocol parsing function buffer overflow)
Sebastian Krahmer of the SuSE Security Team has discovered a remotely
exploitable buffer overflow vulnerability in the code handling MSN protocol
parsing.
Impact
By sending a carefully-crafted message, a possible hacker may execute arbitrary
code with the permissions of the user running Gaim.
Workaround
There is no known workaround at this time. All users are encouraged to
upgrade to the latest available version of Gaim.
References:
http://www.osvdb.org/displayvuln.php?osvdb_id=8382
Solution:
All Gaim users should upgrade to the latest version:
# emerge sync
# emerge -pv ">=net-im/gaim-0.81-r1"
# emerge ">=net-im/gaim-0.81-r1"
Threat Level: Medium
Click HERE for more information and discussions on this network vulnerability scan.
|