|
Family: Gentoo Local Security Checks --> Category: infos
[GLSA-200410-23] Gaim: Multiple vulnerabilities Vulnerability Scan
Vulnerability Scan Summary Gaim: Multiple vulnerabilities
Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200410-23
(Gaim: Multiple vulnerabilities)
A possible buffer overflow exists in the code processing MSN SLP messages
(CVE-2004-0891). memcpy() was used without validating the size of the
buffer, and an incorrect buffer was used as destination under certain
circumstances. Additionally, memory allocation problems were found in the
processing of MSN SLP messages and the receiving of files. These issues
could lead Gaim to try to allocate more memory than available, resulting in
the crash of the application.
Impact
A remote attacker could crash Gaim and possibly execute arbitrary code by
exploiting the buffer overflow.
Workaround
There is no known workaround at this time.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0891
http://gaim.sourceforge.net/security/
Solution:
All Gaim users should upgrade to the latest version:
# emerge sync
# emerge -pv ">=net-im/gaim-1.0.2"
# emerge ">=net-im/gaim-1.0.2"
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|