Mandrake Linux Security Advisory : gaim (MDKSA-2005:139)

High Nessus Plugin ID 19896


The remote Mandrake Linux host is missing one or more security updates.


Yet more vulnerabilities have been discovered in the gaim IM client.
Invalid characters in a sent file can cause Gaim to crash on some systems (CVE-2005-2102); a remote AIM or ICQ user can cause a buffer overflow in Gaim by setting an away message containing many AIM substitution strings (CVE-2005-2103); a memory alignment bug in the library used by Gaim to access the Gadu-Gadu network can result in a buffer overflow on non-x86 architecture systems (CVE-2005-2370).

These problems have been corrected in gaim 1.5.0 which is provided with this update.


Update the affected packages.

Plugin Details

Severity: High

ID: 19896

File Name: mandrake_MDKSA-2005-139.nasl

Version: $Revision: 1.15 $

Type: local

Published: 2005/10/05

Modified: 2013/05/31

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:gaim, p-cpe:/a:mandriva:linux:gaim-devel, p-cpe:/a:mandriva:linux:gaim-gevolution, p-cpe:/a:mandriva:linux:gaim-perl, p-cpe:/a:mandriva:linux:gaim-silc, p-cpe:/a:mandriva:linux:gaim-tcl, p-cpe:/a:mandriva:linux:lib64gaim-remote0, p-cpe:/a:mandriva:linux:lib64gaim-remote0-devel, p-cpe:/a:mandriva:linux:libgaim-remote0, p-cpe:/a:mandriva:linux:libgaim-remote0-devel, cpe:/o:mandrakesoft:mandrake_linux:10.1, x-cpe:/o:mandrakesoft:mandrake_linux:le2005

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Patch Publication Date: 2005/08/15

Reference Information

CVE: CVE-2005-2102, CVE-2005-2103, CVE-2005-2370

MDKSA: 2005:139