RHEL 3 / 4 : gaim (RHSA-2005:429)

This script is Copyright (C) 2005-2014 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing a security update.

Description :

An updated gaim package that fixes two security issues is now
available.

This update has been rated as having critical security impact by the
Red Hat Security Response Team.

The Gaim application is a multi-protocol instant messaging client.

A stack based buffer overflow bug was found in the way gaim processes
a message containing a URL. A remote attacker could send a carefully
crafted message resulting in the execution of arbitrary code on a
victim's machine. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CVE-2005-1261 to this issue.

A bug was found in the way gaim handles malformed MSN messages. A
remote attacker could send a carefully crafted MSN message causing
gaim to crash. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CVE-2005-1262 to this issue.

Users of Gaim are advised to upgrade to this updated package which
contains backported patches and is not vulnerable to these issues.

See also :

https://www.redhat.com/security/data/cve/CVE-2005-1261.html
https://www.redhat.com/security/data/cve/CVE-2005-1262.html
http://rhn.redhat.com/errata/RHSA-2005-429.html

Solution :

Update the affected gaim package.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Family: Red Hat Local Security Checks

Nessus Plugin ID: 18240 ()

Bugtraq ID:

CVE ID: CVE-2005-1261
CVE-2005-1262