RHEL 3 : gaim (RHSA-2004:604)

This script is Copyright (C) 2004-2014 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing a security update.

Description :

An updated gaim package that fixes security issues, fixes various
bugs, and includes various enhancements for Red Hat Enterprise Linux 3
is now available.

The gaim application is a multi-protocol instant messaging client.

A buffer overflow has been discovered in the MSN protocol handler.
When receiving unexpected sequence of MSNSLP messages, it is possible
that an attacker could cause an internal buffer overflow, leading to a
crash or possible code execution. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CVE-2004-0891
to this issue.

This updated gaim package also fixes multiple user interface,
protocol, and error handling problems, including an ICQ communication
encoding issue.

Additionally, these updated packages have compiled gaim as a PIE
(position independent executable) for added protection against future
security vulnerabilities.

All users of gaim should upgrade to this updated package, which
includes various bug fixes, as well as a backported security patch.

See also :

https://www.redhat.com/security/data/cve/CVE-2004-0891.html
http://rhn.redhat.com/errata/RHSA-2004-604.html

Solution :

Update the affected gaim package.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Family: Red Hat Local Security Checks

Nessus Plugin ID: 15532 ()

Bugtraq ID:

CVE ID: CVE-2004-0891