Nessus Plugin #14568
Plugin Index
Note: This file has been created from a
downloaded version of the Nessus Plugins
from
http://www.nessus.org/.
Therefore, the information here can be outdated.
[GLSA-200408-12] Gaim: MSN protocol parsing function buffer overflow
- Family:
- Gentoo Local Security Checks
- Category:
- infos
- Copyright:
- (C) 2004 Michel Arboi
- Summary:
- Gaim: MSN protocol parsing function buffer overflow
- Version:
- $Revision: 1.1 $
- Cve_id:
- -
- Bugtraq_id:
- -
- Xrefs:
- GLSA:200408-12, OSVDB:8382
- Description:
- The remote host is affected by the vulnerability described in GLSA-200408-12
(Gaim: MSN protocol parsing function buffer overflow)
Sebastian Krahmer of the SuSE Security Team has discovered a remotely
exploitable buffer overflow vulnerability in the code handling MSN protocol
parsing.
Impact
By sending a carefully-crafted message, an attacker may execute arbitrary
code with the permissions of the user running Gaim.
Workaround
There is no known workaround at this time. All users are encouraged to
upgrade to the latest available version of Gaim.
References:
http://www.osvdb.org/displayvuln.php?osvdb_id=8382
Solution:
All Gaim users should upgrade to the latest version:
# emerge sync
# emerge -pv ">=net-im/gaim-0.81-r1"
# emerge ">=net-im/gaim-0.81-r1"
Risk Factor : Medium
Generiert am 27.04.2005 um 18:49:54 Uhr.