Ubuntu 4.10 / 5.04 : gaim vulnerabilities (USN-168-1)

Ubuntu Security Notice (C) 2005-2015 Canonical, Inc. / NASL script (C) 2006-2015 Tenable Network Security, Inc.

Synopsis :

The remote Ubuntu host is missing one or more security-related patches.

Description :

Daniel Atallah discovered a Denial of Service vulnerability in the
file transfer handler of OSCAR (the module that handles various
instant messaging protocols like ICQ). A remote attacker could crash
the Gaim client of an user by attempting to send him a file with a
name that contains invalid UTF-8 characters. (CAN-2005-2102)

It was found that specially crafted 'away' messages triggered a buffer
overflow. A remote attacker could exploit this to crash the Gaim
client or possibly even execute arbitrary code with the permissions of
the Gaim user. (CAN-2005-2103)

Szymon Zygmunt and MichaÅ Bartoszkiewicz discovered a memory
alignment error in the Gadu library, which was fixed in USN-162-1.
However, it was discovered that Gaim contains a copy of the vulnerable
code. By sending specially crafted messages over the Gadu protocol, a
remote attacker could crash Gaim. (CAN-2005-2370).

Solution :

Update the affected gaim, gaim-data and / or gaim-dev packages.

Risk factor :

High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.5
Public Exploit Available : false

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 20574 ()

Bugtraq ID: 14531

CVE ID: CVE-2005-2102