Nessus Plugin #14568

Plugin Index

Note: This file has been created from a downloaded version of the Nessus Plugins from http://www.nessus.org/. Therefore, the information here can be outdated.

[GLSA-200408-12] Gaim: MSN protocol parsing function buffer overflow

Family:
Gentoo Local Security Checks
Category:
infos
Copyright:
(C) 2004 Michel Arboi
Summary:
Gaim: MSN protocol parsing function buffer overflow
Version:
$Revision: 1.1 $
Cve_id:
-
Bugtraq_id:
-
Xrefs:
GLSA:200408-12, OSVDB:8382
Description:
The remote host is affected by the vulnerability described in GLSA-200408-12
(Gaim: MSN protocol parsing function buffer overflow)


Sebastian Krahmer of the SuSE Security Team has discovered a remotely
exploitable buffer overflow vulnerability in the code handling MSN protocol
parsing.

Impact

By sending a carefully-crafted message, an attacker may execute arbitrary
code with the permissions of the user running Gaim.

Workaround

There is no known workaround at this time. All users are encouraged to
upgrade to the latest available version of Gaim.

References:
http://www.osvdb.org/displayvuln.php?osvdb_id=8382


Solution:
All Gaim users should upgrade to the latest version:
# emerge sync
# emerge -pv ">=net-im/gaim-0.81-r1"
# emerge ">=net-im/gaim-0.81-r1"


Risk Factor : Medium
Generiert am 27.04.2005 um 18:49:54 Uhr.