Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Slackware Local Security Checks >> SSA-2004-026-01 GAIM security update


Vulnerability Assessment Details

SSA-2004-026-01 GAIM security update

Vulnerability Assessment Summary
SSA-2004-026-01 GAIM security update

Detailed Explanation for this Vulnerability Assessment

GAIM is a GTK2-based Instant Messaging (IM) client.

New GAIM packages are available for Slackware 9.0, 9.1, and -current.
12 vulnerabilities were found in the instant messenger GAIM that
permit remote compromise. All sites using GAIM should upgrade to these
new packages. These are based on GAIM 0.75 with patches for all 12
security issues. Thanks to Stefan Esser of e-matters GmbH for
finding and reporting these bugs.

For more details, see the e-matters GmbH advisory here:
http://security.e-matters.de/advisories/012004.html




Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Michel Arboi

Cables, Connectors

Lenovo ThinkCentre Edge M92z AIO SATA Hard Drive HDD DVD Optical Cables 54y8287
$6.2
Lenovo ThinkCentre Edge M92z AIO SATA Hard Drive HDD DVD Optical Cables 54y8287 pictureLenovo Thinkpad X1 Carbon 4 i5-6300U, 8GB, 512SSD, FHD, W10Pro, Warranty
$799.0
Lenovo Thinkpad X1 Carbon 4     i5-6300U, 8GB, 512SSD, FHD, W10Pro, Warranty pictureLenovo FRU: 54Y8293 for ThinkCentre M92z Cable
$6.99
Lenovo FRU: 54Y8293 for ThinkCentre M92z Cable pictureLot of 2 IBM BladeCenter H Chassis Blade Filler Blank 39Y5034 02R9335 02R9331
$10.0
Lot of 2 IBM BladeCenter H Chassis Blade Filler Blank 39Y5034 02R9335 02R9331 picture


Discussions

No Discussions have been posted on this vulnerability.