Joined: 13 Jun 2003
Location: Dresden, Germany
|Posted: Thu Aug 12, 2004 9:50 pm Post subject: [ GLSA 200408-12 ] Gaim: MSN protocol parsing function buffe
|Gentoo Linux Security Advisory
Title: Gaim: MSN protocol parsing function buffer overflow (GLSA 200408-12)
Date: August 12, 2004
Updated: May 22, 2006
Gaim contains a remotely exploitable buffer overflow vulnerability in the MSN-protocol parsing code that may allow remote execution of arbitrary code.
Gaim is a multi-protocol instant messaging client for Linux which supports many instant messaging protocols.
Vulnerable: <= 0.81
Unaffected: >= 0.81-r1
Architectures: All supported architectures
Sebastian Krahmer of the SuSE Security Team has discovered a remotely exploitable buffer overflow vulnerability in the code handling MSN protocol parsing.
By sending a carefully-crafted message, an attacker may execute arbitrary code with the permissions of the user running Gaim.
There is no known workaround at this time. All users are encouraged to upgrade to the latest available version of Gaim.
All Gaim users should upgrade to the latest version:
|# emerge sync
# emerge -pv ">=net-im/gaim-0.81-r1"
# emerge ">=net-im/gaim-0.81-r1"
OSVDB ID: 8382
Last edited by GLSA on Thu Nov 23, 2006 4:16 am; edited 4 times in total