|
Family: Gentoo Local Security Checks --> Category: infos
[GLSA-200408-27] Gaim: New vulnerabilities Vulnerability Scan
Vulnerability Scan Summary Gaim: New vulnerabilities
Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200408-27
(Gaim: New vulnerabilities)
Gaim fails to do proper bounds checking when:
Handling MSN messages (partially fixed with GLSA 200408-12).
Handling rich text format messages.
Resolving local hostname.
Receiving long URLs.
Handling groupware messages.
Allocating memory for webpages with fake content-length header.
Furthermore Gaim fails to escape filenames when using drag and drop
installation of smiley themes.
Impact
These vulnerabilites could allow a possible hacker to crash Gaim or execute
arbitrary code or commands with the permissions of the user running Gaim.
Workaround
There is no known workaround at this time. All users are encouraged to
upgrade to the latest available version of Gaim.
References:
http://gaim.sourceforge.net/security/index.php
Solution:
All gaim users should upgrade to the latest version:
# emerge sync
# emerge -pv ">=net-im/gaim-0.81-r5"
# emerge ">=net-im/gaim-0.81-r5"
Threat Level: Medium
Click HERE for more information and discussions on this network vulnerability scan.
|