Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.50646
Category:Mandrake Local Security Checks
Title:Mandrake Security Advisory MDKSA-2004:006-1 (gaim)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to gaim
announced via advisory MDKSA-2004:006-1.

A number of vulnerabilities were discovered in the gaim instant
messenger program by Steffan Esser, versions 0.75 and earlier.
Thanks to Jacques A. Vidrine for providing initial patches.

Multiple buffer overflows exist in gaim 0.75 and earlier: When
parsing cookies in a Yahoo web connection
YMSG protocol overflows
parsing the Yahoo login webpage
a YMSG packet overflow
flaws in
the URL parser
and flaws in the HTTP Proxy connect (CAN-2004-006).

A buffer overflow in gaim 0.74 and earlier in the Extract Info Field
Function used for MSN and YMSG protocol handlers (CAN-2004-007).

An integer overflow in gaim 0.74 and earlier, when allocating memory
for a directIM packet results in a heap overflow (CVE-2004-0008).

Update:

The patch used to correct the problem was slightly malformed and
could cause an infinite loop and crash with the Yahoo protocol.
The new packages have a corrected patch that resolves the problem.

Affected versions: 9.1, 9.2

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

https://secure1.securityspace.com/smysecure/catid.html?in=MDKSA-2004:006-1
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0006
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0007
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0008

Risk factor : High

CVSS Score:
7.5

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2004-0008
Bugtraq: 20040126 Advisory 01/2004: 12 x Gaim remote overflows (Google Search)
http://marc.info/?l=bugtraq&m=107513690306318&w=2
Bugtraq: 20040127 Ultramagnetic Advisory #001: Multiple vulnerabilities in Gaim code (Google Search)
http://marc.info/?l=bugtraq&m=107522432613022&w=2
Bugtraq: 20040127 [slackware-security] GAIM security update (SSA:2004-026-01) (Google Search)
http://marc.info/?l=bugtraq&m=107522338611564&w=2
CERT/CC vulnerability note: VU#779614
http://www.kb.cert.org/vuls/id/779614
Conectiva Linux advisory: CLA-2004:813
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000813
Debian Security Information: DSA-434 (Google Search)
http://www.debian.org/security/2004/dsa-434
http://archives.neohapsis.com/archives/fulldisclosure/2004-01/0994.html
http://security.gentoo.org/glsa/glsa-200401-04.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2004:006
http://security.e-matters.de/advisories/012004.html
http://www.osvdb.org/3734
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A820
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9469
http://www.redhat.com/support/errata/RHSA-2004-032.html
http://www.redhat.com/support/errata/RHSA-2004-033.html
http://www.redhat.com/support/errata/RHSA-2004-045.html
http://www.securitytracker.com/id?1008850
SGI Security Advisory: 20040201-01-U
ftp://patches.sgi.com/support/free/security/advisories/20040201-01-U.asc
SGI Security Advisory: 20040202-01-U
ftp://patches.sgi.com/support/free/security/advisories/20040202-01-U.asc
XForce ISS Database: gaim-directim-bo(14937)
https://exchange.xforce.ibmcloud.com/vulnerabilities/14937
Common Vulnerability Exposure (CVE) ID: CVE-2004-0006
BugTraq ID: 9489
http://www.securityfocus.com/bid/9489
CERT/CC vulnerability note: VU#297198
http://www.kb.cert.org/vuls/id/297198
CERT/CC vulnerability note: VU#371382
http://www.kb.cert.org/vuls/id/371382
CERT/CC vulnerability note: VU#444158
http://www.kb.cert.org/vuls/id/444158
CERT/CC vulnerability note: VU#503030
http://www.kb.cert.org/vuls/id/503030
CERT/CC vulnerability note: VU#527142
http://www.kb.cert.org/vuls/id/527142
CERT/CC vulnerability note: VU#871838
http://www.kb.cert.org/vuls/id/871838
http://www.osvdb.org/3731
http://www.osvdb.org/3732
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10222
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A818
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.361158
SuSE Security Announcement: SuSE-SA:2004:004 (Google Search)
http://www.novell.com/linux/security/advisories/2004_04_gaim.html
XForce ISS Database: gaim-http-proxy-bo(14947)
https://exchange.xforce.ibmcloud.com/vulnerabilities/14947
XForce ISS Database: gaim-login-name-bo(14940)
https://exchange.xforce.ibmcloud.com/vulnerabilities/14940
XForce ISS Database: gaim-login-value-bo(14941)
https://exchange.xforce.ibmcloud.com/vulnerabilities/14941
XForce ISS Database: gaim-urlparser-bo(14945)
https://exchange.xforce.ibmcloud.com/vulnerabilities/14945
XForce ISS Database: gaim-yahoopacketread-keyname-bo(14943)
https://exchange.xforce.ibmcloud.com/vulnerabilities/14943
XForce ISS Database: gaim-yahoowebpending-cookie-bo(14939)
https://exchange.xforce.ibmcloud.com/vulnerabilities/14939
Common Vulnerability Exposure (CVE) ID: CVE-2004-0007
CERT/CC vulnerability note: VU#197142
http://www.kb.cert.org/vuls/id/197142
http://www.osvdb.org/3733
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A819
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9906
http://www.securityfocus.com/advisories/6281
XForce ISS Database: gaim-extractinfo-bo(14946)
https://exchange.xforce.ibmcloud.com/vulnerabilities/14946
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.