GLSA-200410-23 : Gaim: Multiple vulnerabilities

Critical Nessus Plugin ID 15559


The remote Gentoo host is missing one or more security-related patches.


The remote host is affected by the vulnerability described in GLSA-200410-23 (Gaim: Multiple vulnerabilities)

A possible buffer overflow exists in the code processing MSN SLP messages (CAN-2004-0891). memcpy() was used without validating the size of the buffer, and an incorrect buffer was used as destination under certain circumstances. Additionally, memory allocation problems were found in the processing of MSN SLP messages and the receiving of files. These issues could lead Gaim to try to allocate more memory than available, resulting in the crash of the application.
Impact :

A remote attacker could crash Gaim and possibly execute arbitrary code by exploiting the buffer overflow.
Workaround :

There is no known workaround at this time.


All Gaim users should upgrade to the latest version:
# emerge sync # emerge -pv '>=net-im/gaim-1.0.2' # emerge '>=net-im/gaim-1.0.2'

See Also

Plugin Details

Severity: Critical

ID: 15559

File Name: gentoo_GLSA-200410-23.nasl

Version: $Revision: 1.13 $

Type: local

Published: 2004/10/25

Modified: 2015/04/13

Dependencies: 12634

Risk Information

Risk Factor: Critical


Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:gaim, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Patch Publication Date: 2004/10/24

Vulnerability Publication Date: 2004/10/19

Reference Information

CVE: CVE-2004-0891

OSVDB: 10986, 10987, 10988

GLSA: 200410-23