This script is Copyright (C) 2004-2014 Tenable Network Security, Inc.
The remote Red Hat host is missing a security update.
An updated gaim package that fixes security issues, fixes various
bugs, and includes various enhancements for Red Hat Enterprise Linux 3
is now available.
The gaim application is a multi-protocol instant messaging client.
A buffer overflow has been discovered in the MSN protocol handler.
When receiving unexpected sequence of MSNSLP messages, it is possible
that an attacker could cause an internal buffer overflow, leading to a
crash or possible code execution. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CVE-2004-0891
to this issue.
This updated gaim package also fixes multiple user interface,
protocol, and error handling problems, including an ICQ communication
Additionally, these updated packages have compiled gaim as a PIE
(position independent executable) for added protection against future
All users of gaim should upgrade to this updated package, which
includes various bug fixes, as well as a backported security patch.
See also :
Update the affected gaim package.
Risk factor :
Critical / CVSS Base Score : 10.0
Family: Red Hat Local Security Checks
Nessus Plugin ID: 15532 ()
CVE ID: CVE-2004-0891
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.