Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.52047
Kategorie:Red Hat Local Security Checks
Titel:RedHat Security Advisory RHSA-2005:365
Zusammenfassung:NOSUMMARY
Beschreibung:Description:

The remote host is missing updates announced in
advisory RHSA-2005:365.

The Gaim application is a multi-protocol instant messaging client.

A buffer overflow bug was found in the way gaim escapes HTML. It is
possible that a remote attacker could send a specially crafted message to a
Gaim client, causing it to crash. The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CVE-2005-0965 to this issue.

A bug was found in several of gaim's IRC processing functions. These
functions fail to properly remove various markup tags within an IRC
message. It is possible that a remote attacker could send a specially
crafted message to a Gaim client connected to an IRC server, causing it to
crash. The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2005-0966 to this issue.

A bug was found in gaim's Jabber message parser. It is possible for a
remote Jabber user to send a specially crafted message to a Gaim client,
causing it to crash. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CVE-2005-0967 to this issue.

In addition to these denial of service issues, multiple minor upstream
bugfixes are included in this update.

Users of Gaim are advised to upgrade to this updated package which contains
Gaim version 1.2.1 and is not vulnerable to these issues.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2005-365.html
http://www.securityfocus.com/archive/1/394806/2005-04-01/2005-04-07/0

Risk factor : High

CVSS Score:
6.4

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2005-0965
BugTraq ID: 12999
http://www.securityfocus.com/bid/12999
Bugtraq: 20050401 multiple remote denial of service vulnerabilities in Gaim (Google Search)
http://marc.info/?l=bugtraq&m=111238715307356&w=2
http://www.securityfocus.com/archive/1/426078/100/0/threaded
http://www.mandriva.com/security/advisories?name=MDKSA-2005:071
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11292
http://www.redhat.com/support/errata/RHSA-2005-365.html
http://secunia.com/advisories/14815
SuSE Security Announcement: SUSE-SA:2005:036 (Google Search)
http://www.novell.com/linux/security/advisories/2005_36_sudo.html
Common Vulnerability Exposure (CVE) ID: CVE-2005-0966
BugTraq ID: 13003
http://www.securityfocus.com/bid/13003
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9185
XForce ISS Database: gaim-irc-plugin-bo(19937)
https://exchange.xforce.ibmcloud.com/vulnerabilities/19937
XForce ISS Database: gaim-ircmsginvite-dos(19939)
https://exchange.xforce.ibmcloud.com/vulnerabilities/19939
Common Vulnerability Exposure (CVE) ID: CVE-2005-0967
BugTraq ID: 13004
http://www.securityfocus.com/bid/13004
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9657
http://securitytracker.com/id?1013645
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.