Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA434] DSA-434-1 gaim


Vulnerability Assessment Details

[DSA434] DSA-434-1 gaim

Vulnerability Assessment Summary
DSA-434-1 gaim

Detailed Explanation for this Vulnerability Assessment

Stefan Esser discovered several security related problems in Gaim, a
multi-protocol instant messaging client. Not all of them are
applicable for the version in Debian stable, but affected the version
in the unstable distribution at least. The problems were grouped for
the Common Vulnerabilities and Exposures as follows:
When the Yahoo Messenger handler decodes an octal value for email
notification functions two different kinds of overflows can be
triggered. When the MIME decoder decoded a quoted printable
encoded string for email notification two other different kinds of
overflows can be triggered. These problems only affect the
version in the unstable distribution.
When parsing the cookies within the HTTP reply header of a Yahoo
web connection a buffer overflow can happen. When parsing the
Yahoo Login Webpage the YMSG protocol overflows stack buffers if
the web page returns oversized values. When splitting a URL into
its parts a stack overflow can be caused. These problems only
affect the version in the unstable distribution.
When an oversized keyname is read from a Yahoo Messenger packet a
stack overflow can be triggered. When Gaim is setup to use an HTTP
proxy for connecting to the server a malicious HTTP proxy can
exploit it. These problems affect all versions Debian ships.
However, the connection to Yahoo doesn't work in the version in
Debian stable.
Internally data is copied between two tokens into a fixed size
stack buffer without a size check. This only affects the version
of gaim in the unstable distribution.
When allocating memory for AIM/Oscar DirectIM packets an integer
overflow can happen, resulting in a heap overflow. This only
affects the version of gaim in the unstable distribution.
For the stable distribution (woody) these problems has been fixed in
version 0.58-2.4.
For the unstable distribution (sid) these problems has been fixed in
version 0.75-2.
We recommend that you upgrade your gaim packages.


Solution : http://www.debian.org/security/2004/dsa-434
Network Security Threat Level: High

Networks Security ID: 9489

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

Vintage KRAFT KM30 Apple IBM JOYSTICK MAC ADB #820136 *RARE* NEW IN BOX
$149.99
Vintage KRAFT KM30 Apple IBM JOYSTICK MAC ADB #820136  *RARE* NEW IN BOX pictureVintage Quantum ProDrive LPS42S 40MB 50 Pin Internal SCSI Hard Drive Apple Mac
$75.0
Vintage Quantum ProDrive LPS42S 40MB 50 Pin Internal SCSI Hard Drive Apple Mac pictureSony MP-F75W-02G Internal 3.5 Floppy Disk Drive Vintage Apple Macintosh Mac
$34.99
Sony MP-F75W-02G Internal 3.5 Floppy Disk Drive Vintage Apple Macintosh Mac picturePower Mac G4 Vintage Desktop Computer working Nice solid classic case apple
$135.0
Power Mac G4 Vintage Desktop Computer working Nice solid classic case apple picture


Discussions

No Discussions have been posted on this vulnerability.