Gentoo Archives: gentoo-announce

From: Sune Kloppenborg Jeppesen <jaervosz@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××.com, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200408-12 ] Gaim: MSN protocol parsing function buffer overflow
Date: Thu, 12 Aug 2004 20:57:43
Message-Id: 200408122252.51940.jaervosz@gentoo.org
1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: SHA1
3
4 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
5 Gentoo Linux Security Advisory GLSA 200408-12
6 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
7 http://security.gentoo.org/
8 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
9
10 Severity: Normal
11 Title: Gaim: MSN protocol parsing function buffer overflow
12 Date: August 12, 2004
13 Bugs: #60034
14 ID: 200408-12
15
16 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
17
18 Synopsis
19 ========
20
21 Gaim contains a remotely exploitable buffer overflow vulnerability in
22 the MSN-protocol parsing code that may allow remote execution of
23 arbitrary code.
24
25 Background
26 ==========
27
28 Gaim is a multi-protocol instant messaging client for Linux which
29 supports many instant messaging protocols.
30
31 Affected packages
32 =================
33
34 -------------------------------------------------------------------
35 Package / Vulnerable / Unaffected
36 -------------------------------------------------------------------
37 1 net-im/gaim <= 0.81 >= 0.81-r1
38
39 Description
40 ===========
41
42 Sebastian Krahmer of the SuSE Security Team has discovered a remotely
43 exploitable buffer overflow vulnerability in the code handling MSN
44 protocol parsing.
45
46 Impact
47 ======
48
49 By sending a carefully-crafted message, an attacker may execute
50 arbitrary code with the permissions of the user running Gaim.
51
52 Workaround
53 ==========
54
55 There is no known workaround at this time. All users are encouraged to
56 upgrade to the latest available version of Gaim.
57
58 Resolution
59 ==========
60
61 All Gaim users should upgrade to the latest version:
62
63 # emerge sync
64
65 # emerge -pv ">=net-im/gaim-0.81-r1"
66 # emerge ">=net-im/gaim-0.81-r1"
67
68 References
69 ==========
70
71 [ 1 ] OSVDB ID: 8382
72 http://www.osvdb.org/displayvuln.php?osvdb_id=8382
73
74 Availability
75 ============
76
77 This GLSA and any updates to it are available for viewing at
78 the Gentoo Security Website:
79
80 http://security.gentoo.org/glsa/glsa-200408-12.xml
81
82 Concerns?
83 =========
84
85 Security is a primary focus of Gentoo Linux and ensuring the
86 confidentiality and security of our users machines is of utmost
87 importance to us. Any security concerns should be addressed to
88 security@g.o or alternatively, you may file a bug at
89 http://bugs.gentoo.org.
90
91 License
92 =======
93
94 Copyright 2004 Gentoo Foundation, Inc; referenced text
95 belongs to its owner(s).
96
97 The contents of this document are licensed under the
98 Creative Commons - Attribution / Share Alike license.
99
100 http://creativecommons.org/licenses/by-sa/1.0
101 -----BEGIN PGP SIGNATURE-----
102 Version: GnuPG v1.2.4 (GNU/Linux)
103
104 iD8DBQFBG9grzKC5hMHO6rkRAvlyAJ93cm3kjA95/uWbXOAnl1prZz6LuQCgi4HM
105 afYkjzfS1+iqHN303EIVGhM=
106 =hh67
107 -----END PGP SIGNATURE-----