Boletines de Vulnerabilidades |
Denegación de servicio en Gaim |
|
Clasificación de la vulnerabilidad |
|
Propiedad | Valor |
Nivel de Confianza | Oficial |
Impacto | Denegación de Servicio |
Dificultad | Experto |
Requerimientos del atacante | Acceso remoto sin cuenta a un servicio estandar |
Información sobre el sistema |
|
Propiedad | Valor |
Fabricante afectado | GNU/Linux |
Software afectado | Gaim <1.1.3 |
Descripción |
|
Se ha descubierto una vulnerabilidad en las versiones anteriores a la 1.1.3 de Gaim. La vulnerabilidad reside en el manejo de los paquetes SNAC recibidos desde usuarios que utilicen AIM o ICQ que pueden provocar que Gaim entre en un bucle infinito bajo determinadas circunstancias. La explotación de esta vulnerabilidad podría permitir a un atacante remoto provocar una situación de denegación de servicio mediante el envío de paquetes SNAC especialmente diseñados. |
|
Solución |
|
Si lo desea, aplique los mecanismos de actualización propios de su distribución, o bien baje las fuentes del software y compílelo usted mismo. Actualización de software Gaim Gaim 1.1.3 http://gaim.sourceforge.net/downloads.php Mandrake Linux Mandrakelinux 10.0 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/gaim-1.1.4-2.1.100mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/gaim-devel-1.1.4-2.1.100mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/gaim-perl-1.1.4-2.1.100mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/gaim-tcl-1.1.4-2.1.100mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/libgaim-remote0-1.1.4-2.1.100mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/libgaim-remote0-devel-1.1.4-2.1.100mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/SRPMS/gaim-1.1.4-2.1.100mdk.src.rpm AMD64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/gaim-1.1.4-2.1.100mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/gaim-devel-1.1.4-2.1.100mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/gaim-perl-1.1.4-2.1.100mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/gaim-tcl-1.1.4-2.1.100mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/lib64gaim-remote0-1.1.4-2.1.100mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/lib64gaim-remote0-devel-1.1.4-2.1.100mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/SRPMS/gaim-1.1.4-2.1.100mdk.src.rpm Mandrakelinux 10.1 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/gaim-1.1.4-2.1.101mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/gaim-devel-1.1.4-2.1.101mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/gaim-gevolution-1.1.4-2.1.101mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/gaim-perl-1.1.4-2.1.101mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/gaim-tcl-1.1.4-2.1.101mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/libgaim-remote0-1.1.4-2.1.101mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/libgaim-remote0-devel-1.1.4-2.1.101mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/SRPMS/gaim-1.1.4-2.1.101mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/gaim-1.1.4-2.1.101mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/gaim-devel-1.1.4-2.1.101mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/gaim-gevolution-1.1.4-2.1.101mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/gaim-perl-1.1.4-2.1.101mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/gaim-tcl-1.1.4-2.1.101mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/lib64gaim-remote0-1.1.4-2.1.101mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/lib64gaim-remote0-devel-1.1.4-2.1.101mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/SRPMS/gaim-1.1.4-2.1.101mdk.src.rpm Corporate Server 3.0 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/gaim-1.1.4-2.1.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/gaim-devel-1.1.4-2.1.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/gaim-perl-1.1.4-2.1.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/gaim-tcl-1.1.4-2.1.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/libgaim-remote0-1.1.4-2.1.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/libgaim-remote0-devel-1.1.4-2.1.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/gaim-1.1.4-2.1.C30mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/gaim-1.1.4-2.1.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/gaim-devel-1.1.4-2.1.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/gaim-perl-1.1.4-2.1.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/gaim-tcl-1.1.4-2.1.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/lib64gaim-remote0-1.1.4-2.1.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/lib64gaim-remote0-devel-1.1.4-2.1.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/SRPMS/gaim-1.1.4-2.1.C30mdk.src.rpm Red Hat Linux Red Hat Desktop (v. 3) Red Hat Desktop (v. 4) Red Hat Enterprise Linux AS (v. 3) Red Hat Enterprise Linux AS (v. 4) Red Hat Enterprise Linux ES (v. 3) Red Hat Enterprise Linux ES (v. 4) Red Hat Enterprise Linux WS (v. 3) Red Hat Enterprise Linux WS (v. 4) https://rhn.redhat.com/ Debian Linux Debian Linux 3.0 Source http://security.debian.org/pool/updates/main/g/gaim/gaim_0.58-2.5.dsc http://security.debian.org/pool/updates/main/g/gaim/gaim_0.58-2.5.diff.gz http://security.debian.org/pool/updates/main/g/gaim/gaim_0.58.orig.tar.gz Alpha http://security.debian.org/pool/updates/main/g/gaim/gaim_0.58-2.5_alpha.deb http://security.debian.org/pool/updates/main/g/gaim/gaim-common_0.58-2.5_alpha.deb http://security.debian.org/pool/updates/main/g/gaim/gaim-gnome_0.58-2.5_alpha.deb ARM http://security.debian.org/pool/updates/main/g/gaim/gaim_0.58-2.5_arm.deb http://security.debian.org/pool/updates/main/g/gaim/gaim-common_0.58-2.5_arm.deb http://security.debian.org/pool/updates/main/g/gaim/gaim-gnome_0.58-2.5_arm.deb Intel IA-32 http://security.debian.org/pool/updates/main/g/gaim/gaim_0.58-2.5_i386.deb http://security.debian.org/pool/updates/main/g/gaim/gaim-common_0.58-2.5_i386.deb http://security.debian.org/pool/updates/main/g/gaim/gaim-gnome_0.58-2.5_i386.deb Intel IA-64 http://security.debian.org/pool/updates/main/g/gaim/gaim_0.58-2.5_ia64.deb http://security.debian.org/pool/updates/main/g/gaim/gaim-common_0.58-2.5_ia64.deb http://security.debian.org/pool/updates/main/g/gaim/gaim-gnome_0.58-2.5_ia64.deb HP Precision http://security.debian.org/pool/updates/main/g/gaim/gaim_0.58-2.5_hppa.deb http://security.debian.org/pool/updates/main/g/gaim/gaim-common_0.58-2.5_hppa.deb http://security.debian.org/pool/updates/main/g/gaim/gaim-gnome_0.58-2.5_hppa.deb Motorola 680x0 http://security.debian.org/pool/updates/main/g/gaim/gaim_0.58-2.5_m68k.deb http://security.debian.org/pool/updates/main/g/gaim/gaim-common_0.58-2.5_m68k.deb http://security.debian.org/pool/updates/main/g/gaim/gaim-gnome_0.58-2.5_m68k.deb Big endian MIPS http://security.debian.org/pool/updates/main/g/gaim/gaim_0.58-2.5_mips.deb http://security.debian.org/pool/updates/main/g/gaim/gaim-common_0.58-2.5_mips.deb http://security.debian.org/pool/updates/main/g/gaim/gaim-gnome_0.58-2.5_mips.deb Little endian MIPS http://security.debian.org/pool/updates/main/g/gaim/gaim_0.58-2.5_mipsel.deb http://security.debian.org/pool/updates/main/g/gaim/gaim-common_0.58-2.5_mipsel.deb http://security.debian.org/pool/updates/main/g/gaim/gaim-gnome_0.58-2.5_mipsel.deb PowerPC http://security.debian.org/pool/updates/main/g/gaim/gaim_0.58-2.5_powerpc.deb http://security.debian.org/pool/updates/main/g/gaim/gaim-common_0.58-2.5_powerpc.deb http://security.debian.org/pool/updates/main/g/gaim/gaim-gnome_0.58-2.5_powerpc.deb IBM S/390 http://security.debian.org/pool/updates/main/g/gaim/gaim_0.58-2.5_s390.deb http://security.debian.org/pool/updates/main/g/gaim/gaim-common_0.58-2.5_s390.deb http://security.debian.org/pool/updates/main/g/gaim/gaim-gnome_0.58-2.5_s390.deb Sun Sparc http://security.debian.org/pool/updates/main/g/gaim/gaim_0.58-2.5_sparc.deb http://security.debian.org/pool/updates/main/g/gaim/gaim-common_0.58-2.5_sparc.deb http://security.debian.org/pool/updates/main/g/gaim/gaim-gnome_0.58-2.5_sparc.deb SUSE Linux Actualizar mediante YaST Online Update |
|
Identificadores estándar |
|
Propiedad | Valor |
CVE | CAN-2005-0472 |
BID | |
Recursos adicionales |
|
Gaim Security Advisory http://gaim.sourceforge.net/security/index.php?id=10 Mandrakesoft Security Advisories MDKSA-2005:049 http://www.mandrakesoft.com/security/advisories?name=MDKSA-2005:049 Red Hat Security Advisory RHSA-2005:215-11 https://rhn.redhat.com/errata/RHSA-2005-215.html Debian Security Advisory DSA 716-1 http://lists.debian.org/debian-security-announce/debian-security-announce-2005/msg00098.html SUSE Security Summary Report SUSE-SR:2005:017 http://www.novell.com/linux/security/advisories/2005_17_sr.html |
Histórico de versiones |
||
Versión | Comentario | Fecha |
1.0 | Aviso emitido | 2005-03-07 |
1.1 | Aviso emitido por Red Hat (RHSA-2005:215-11) | 2005-03-11 |
1.2 | Aviso emitido por Debian (DSA 716-1) | 2005-04-28 |
1.3 | Aviso emitido por SUSE (SUSE-SR:2005:017) | 2005-07-14 |