Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Detailed Explanation for this Vulnerability Assessment
Stefan Esser discovered several security related problems in Gaim, a
multi-protocol instant messaging client. Not all of them are
applicable for the version in Debian stable, but affected the version
in the unstable distribution at least. The problems were grouped for
the Common Vulnerabilities and Exposures as follows:
When the Yahoo Messenger handler decodes an octal value for email
notification functions two different kinds of overflows can be
triggered. When the MIME decoder decoded a quoted printable
encoded string for email notification two other different kinds of
overflows can be triggered. These problems only affect the
version in the unstable distribution.
When parsing the cookies within the HTTP reply header of a Yahoo
web connection a buffer overflow can happen. When parsing the
Yahoo Login Webpage the YMSG protocol overflows stack buffers if
the web page returns oversized values. When splitting a URL into
its parts a stack overflow can be caused. These problems only
affect the version in the unstable distribution.
When an oversized keyname is read from a Yahoo Messenger packet a
stack overflow can be triggered. When Gaim is setup to use an HTTP
proxy for connecting to the server a malicious HTTP proxy can
exploit it. These problems affect all versions Debian ships.
However, the connection to Yahoo doesn't work in the version in
Internally data is copied between two tokens into a fixed size
stack buffer without a size check. This only affects the version
of gaim in the unstable distribution.
When allocating memory for AIM/Oscar DirectIM packets an integer
overflow can happen, resulting in a heap overflow. This only
affects the version of gaim in the unstable distribution.
For the stable distribution (woody) these problems has been fixed in
For the unstable distribution (sid) these problems has been fixed in
We recommend that you upgrade your gaim packages.
Solution : http://www.debian.org/security/2004/dsa-434
Network Security Threat Level: High
Networks Security ID: 9489
Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi
|Vintage 9-Track Magnetic Tapes - Mainframe - Lot of 3 - Extended Length
|E132670 Your Sinclair Vintage Computer Magazine May 1988 Issue No. 29
|E132666 Your Sinclair Vintage Computer Magazine January 1988 Issue No. 25
No Discussions have been posted on this vulnerability.