GLSA-200410-23 : Gaim: Multiple vulnerabilities

critical Nessus Plugin ID 15559

Synopsis

The remote Gentoo host is missing one or more security-related patches.

Description

The remote host is affected by the vulnerability described in GLSA-200410-23 (Gaim: Multiple vulnerabilities)

A possible buffer overflow exists in the code processing MSN SLP messages (CAN-2004-0891). memcpy() was used without validating the size of the buffer, and an incorrect buffer was used as destination under certain circumstances. Additionally, memory allocation problems were found in the processing of MSN SLP messages and the receiving of files. These issues could lead Gaim to try to allocate more memory than available, resulting in the crash of the application.
Impact :

A remote attacker could crash Gaim and possibly execute arbitrary code by exploiting the buffer overflow.
Workaround :

There is no known workaround at this time.

Solution

All Gaim users should upgrade to the latest version:
# emerge sync # emerge -pv '>=net-im/gaim-1.0.2' # emerge '>=net-im/gaim-1.0.2'

See Also

http://www.pidgin.im/security/

https://security.gentoo.org/glsa/200410-23

Plugin Details

Severity: Critical

ID: 15559

File Name: gentoo_GLSA-200410-23.nasl

Version: 1.17

Type: local

Published: 10/25/2004

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:gentoo:linux, p-cpe:/a:gentoo:linux:gaim

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Patch Publication Date: 10/24/2004

Reference Information

CVE: CVE-2004-0891

GLSA: 200410-23