RHEL 3 : gaim (RHSA-2004:400)

high Nessus Plugin ID 14696

Synopsis

The remote Red Hat host is missing a security update.

Description

An updated gaim package that fixes several security issues is now available.

Gaim is an instant messenger client that can handle multiple protocols.

Buffer overflow bugs were found in the Gaim MSN protocol handler. In order to exploit these bugs, an attacker would have to perform a man in the middle attack between the MSN server and the vulnerable Gaim client. Such an attack could allow arbitrary code execution. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-0500 to this issue.

Buffer overflow bugs have been found in the Gaim URL decoder, local hostname resolver, and the RTF message parser. It is possible that a remote attacker could send carefully crafted data to a vulnerable client and lead to a crash or arbitrary code execution. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-0785 to this issue.

A shell escape bug has been found in the Gaim smiley theme file installation. When a user installs a smiley theme, which is contained within a tar file, the unarchiving of the data is done in an unsafe manner. An attacker could create a malicious smiley theme that would execute arbitrary commands if the theme was installed by the victim.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-0784 to this issue.

An integer overflow bug has been found in the Gaim Groupware message receiver. It is possible that if a user connects to a malicious server, an attacker could send carefully crafted data which could lead to arbitrary code execution on the victims machine. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-0754 to this issue.

Users of Gaim are advised to upgrade to this updated package which contains Gaim version 0.82 and is not vulnerable to these issues.

Solution

Update the affected gaim package.

See Also

https://access.redhat.com/security/cve/cve-2004-0500

https://access.redhat.com/security/cve/cve-2004-0754

https://access.redhat.com/security/cve/cve-2004-0784

https://access.redhat.com/security/cve/cve-2004-0785

http://www.pidgin.im/news/security/?id=0

http://www.pidgin.im/news/security/?id=1

http://www.pidgin.im/news/security/?id=2

http://www.pidgin.im/news/security/?id=3

http://www.pidgin.im/news/security/?id=4

http://www.pidgin.im/news/security/?id=5

http://www.pidgin.im/news/security/?id=6

https://access.redhat.com/errata/RHSA-2004:400

Plugin Details

Severity: High

ID: 14696

File Name: redhat-RHSA-2004-400.nasl

Version: 1.26

Type: local

Agent: unix

Published: 9/9/2004

Updated: 1/14/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:gaim, cpe:/o:redhat:enterprise_linux:3

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 9/7/2004

Vulnerability Publication Date: 9/28/2004

Reference Information

CVE: CVE-2004-0500, CVE-2004-0754, CVE-2004-0784, CVE-2004-0785

RHSA: 2004:400