Mandrake Linux Security Advisory : gaim (MDKSA-2002:054-1)

This script is Copyright (C) 2004-2016 Tenable Network Security, Inc.


Synopsis :

The remote Mandrake Linux host is missing a security update.

Description :

Versions of Gaim (an AOL instant message client) prior to 0.58 contain
a buffer overflow in the Jabber plug-in module. As well, a
vulnerability was discovered in the URL-handling code, where the
'manual' browser command passes an untrusted string to the shell
without reliable quoting or escaping. This allows an attacker to
execute arbitrary commands on the user's machine with the user's
permissions. Those using the built-in browser commands are not
vulnerable.

Update :

The 8.1 package had an incorrect dependency on perl. This package has
been replaced with a proper package. Please note the differing md5
sums.

See also :

http://gaim.sourceforge.net/ChangeLog

Solution :

Update the affected gaim package.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.5
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : true

Family: Mandriva Local Security Checks

Nessus Plugin ID: 13956 (mandrake_MDKSA-2002-054.nasl)

Bugtraq ID: 5406
5574

CVE ID: CVE-2002-0384
CVE-2002-0989

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now