Mandrake Linux Security Advisory : gaim (MDKSA-2005:139)

high Nessus Plugin ID 19896

Synopsis

The remote Mandrake Linux host is missing one or more security updates.

Description

Yet more vulnerabilities have been discovered in the gaim IM client.
Invalid characters in a sent file can cause Gaim to crash on some systems (CVE-2005-2102); a remote AIM or ICQ user can cause a buffer overflow in Gaim by setting an away message containing many AIM substitution strings (CVE-2005-2103); a memory alignment bug in the library used by Gaim to access the Gadu-Gadu network can result in a buffer overflow on non-x86 architecture systems (CVE-2005-2370).

These problems have been corrected in gaim 1.5.0 which is provided with this update.

Solution

Update the affected packages.

Plugin Details

Severity: High

ID: 19896

File Name: mandrake_MDKSA-2005-139.nasl

Version: 1.18

Type: local

Published: 10/5/2005

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:gaim, p-cpe:/a:mandriva:linux:gaim-devel, p-cpe:/a:mandriva:linux:gaim-gevolution, p-cpe:/a:mandriva:linux:gaim-perl, p-cpe:/a:mandriva:linux:gaim-silc, p-cpe:/a:mandriva:linux:gaim-tcl, p-cpe:/a:mandriva:linux:lib64gaim-remote0, p-cpe:/a:mandriva:linux:lib64gaim-remote0-devel, p-cpe:/a:mandriva:linux:libgaim-remote0, p-cpe:/a:mandriva:linux:libgaim-remote0-devel, cpe:/o:mandrakesoft:mandrake_linux:10.1, x-cpe:/o:mandrakesoft:mandrake_linux:le2005

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Patch Publication Date: 8/15/2005

Reference Information

CVE: CVE-2005-2102, CVE-2005-2103, CVE-2005-2370

MDKSA: 2005:139