CentOS 4 : kdenetwork (CESA-2005:639)

high Nessus Plugin ID 21954

Synopsis

The remote CentOS host is missing one or more security updates.

Description

Updated kdenetwork packages to correct a security flaw in Kopete are now available for Red Hat Enterprise Linux 4.

This update has been rated as having critical security impact by the Red Hat Security Response Team.

The kdenetwork package contains networking applications for the K Desktop Environment. Kopete is a KDE instant messenger which supports a number of protocols including ICQ, MSN, Yahoo, Jabber, and Gadu-Gadu.

Multiple integer overflow flaws were found in the way Kopete processes Gadu-Gadu messages. A remote attacker could send a specially crafted Gadu-Gadu message which would cause Kopete to crash or possibly execute arbitrary code. The Common Vulnerabilities and Exposures project assigned the name CVE-2005-1852 to this issue.

In order to be affected by this issue, a user would need to have registered with Gadu-Gadu and be signed in to the Gadu-Gadu server in order to receive a malicious message. In addition, Red Hat believes that the Exec-shield technology (enabled by default in Red Hat Enterprise Linux 4) would block attempts to remotely exploit this vulnerability.

Note that this issue does not affect Red Hat Enterprise Linux 2.1 or 3.

Users of Kopete should update to these packages which contain a patch to correct this issue.

Solution

Update the affected kdenetwork packages.

See Also

http://www.nessus.org/u?2f288dee

http://www.nessus.org/u?176e7faa

http://www.nessus.org/u?d223ca3f

Plugin Details

Severity: High

ID: 21954

File Name: centos_RHSA-2005-639.nasl

Version: 1.16

Type: local

Agent: unix

Published: 7/5/2006

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/o:centos:centos:4, p-cpe:/a:centos:centos:kdenetwork-devel, p-cpe:/a:centos:centos:kdenetwork-nowlistening, p-cpe:/a:centos:centos:kdenetwork

Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list

Patch Publication Date: 7/22/2005

Vulnerability Publication Date: 7/26/2005

Reference Information

CVE: CVE-2005-1852, CVE-2005-2369, CVE-2005-2370, CVE-2005-2448

RHSA: 2005:639