Ubuntu 6.06 LTS : gaim vulnerabilities (USN-781-2)

Ubuntu Security Notice (C) 2009-2015 Canonical, Inc. / NASL script (C) 2009-2015 Tenable Network Security, Inc.


Synopsis :

The remote Ubuntu host is missing one or more security-related patches.

Description :

It was discovered that Gaim did not properly handle certain malformed
messages when sending a file using the XMPP protocol handler. If a
user were tricked into sending a file, a remote attacker could send a
specially crafted response and cause Gaim to crash, or possibly
execute arbitrary code with user privileges. (CVE-2009-1373)

It was discovered that Gaim did not properly handle certain malformed
messages in the MSN protocol handler. A remote attacker could send a
specially crafted message and possibly execute arbitrary code with
user privileges. (CVE-2009-1376).

Solution :

Update the affected gaim, gaim-data and / or gaim-dev packages.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.1
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 39313 ()

Bugtraq ID: 35067

CVE ID: CVE-2009-1373
CVE-2009-1376