RHEL 4 : kdenetwork (RHSA-2005:639)

high Nessus Plugin ID 19286

Synopsis

The remote Red Hat host is missing one or more security updates for kdenetwork.

Description

The remote Redhat Enterprise Linux 4 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2005:639 advisory.

The kdenetwork package contains networking applications for the K Desktop Environment. Kopete is a KDE instant messenger which supports a number of protocols including ICQ, MSN, Yahoo, Jabber, and Gadu-Gadu.

Multiple integer overflow flaws were found in the way Kopete processes Gadu-Gadu messages. A remote attacker could send a specially crafted Gadu-Gadu message which would cause Kopete to crash or possibly execute arbitrary code. The Common Vulnerabilities and Exposures project assigned the name CAN-2005-1852 to this issue.

In order to be affected by this issue, a user would need to have registered with Gadu-Gadu and be signed in to the Gadu-Gadu server in order to receive a malicious message. In addition, Red Hat believes that the Exec-shield technology (enabled by default in Red Hat Enterprise Linux 4) would block attempts to remotely exploit this vulnerability.

Note that this issue does not affect Red Hat Enterprise Linux 2.1 or 3.

Users of Kopete should update to these packages which contain a patch to correct this issue.

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the RHEL kdenetwork package based on the guidance in RHSA-2005:639.

See Also

http://www.kde.org/info/security/advisory-20050721-1.txt

http://www.nessus.org/u?e71ab791

https://access.redhat.com/security/updates/classification/#critical

https://bugzilla.redhat.com/show_bug.cgi?id=163811

https://access.redhat.com/errata/RHSA-2005:639

Plugin Details

Severity: High

ID: 19286

File Name: redhat-RHSA-2005-639.nasl

Version: 1.27

Type: local

Agent: unix

Published: 7/22/2005

Updated: 11/4/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

Vendor

Vendor Severity: Critical

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2005-2369

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2005-2370

Vulnerability Information

CPE: cpe:/o:redhat:enterprise_linux:4, p-cpe:/a:redhat:enterprise_linux:kdenetwork-devel, p-cpe:/a:redhat:enterprise_linux:kdenetwork-nowlistening, p-cpe:/a:redhat:enterprise_linux:kdenetwork

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 7/21/2005

Vulnerability Publication Date: 7/26/2005

Reference Information

CVE: CVE-2005-1852, CVE-2005-2369, CVE-2005-2370, CVE-2005-2448

RHSA: 2005:639