Vulnerability Bulletins |
Múltiples desbordamientos de búfer en Gaim |
|
Vulnerability classification |
|
Property | Value |
Confidence level | Oficial |
Impact | Obtener acceso |
Dificulty | Experto |
Required attacker level | Acceso remoto sin cuenta a un servicio exotico |
System information |
|
Property | Value |
Affected manufacturer | GNU/Linux |
Affected software | gaim <0.82 |
Description |
|
Se han descubierto múltiples vulnerabilidades de desbordamiento de búfer en las versiones anteriores a la 0.82 de Gaim. Las vulnerabilidades residen en el manejo de los mensajes RTF (Rich Text Format), en la resolución del hostname de la máquina local a través de DNS y en el manejo de URL largas por parte del decodificador URL. La explotación de estas vulnerabilidades podría permitir a un atacante remoto la ejecución remota de código con los privilegios del usuario que esté ejecutando el programa Gaim. |
|
Solution |
|
Actualización de software Gaim Gaim 0.82 http://prdownloads.sourceforge.net/gaim/gaim-0.82.1.tar.gz?download Red Hat Linux Red Hat Desktop (v. 3) AMD64 gaim-0.82.1-0.RHEL3.x86_64.rpm SRPMS gaim-0.82.1-0.RHEL3.src.rpm i386 gaim-0.82.1-0.RHEL3.i386.rpm https://rhn.redhat.com/ Red Hat Enterprise Linux AS (v. 3) AMD64 gaim-0.82.1-0.RHEL3.x86_64.rpm SRPMS gaim-0.82.1-0.RHEL3.src.rpm i386 gaim-0.82.1-0.RHEL3.i386.rpm ia64 gaim-0.82.1-0.RHEL3.ia64.rpm ppc gaim-0.82.1-0.RHEL3.ppc.rpm s390 gaim-0.82.1-0.RHEL3.s390.rpm s390x gaim-0.82.1-0.RHEL3.s390x.rpm https://rhn.redhat.com/ Red Hat Enterprise Linux ES (v. 3) AMD64 gaim-0.82.1-0.RHEL3.x86_64.rpm SRPMS gaim-0.82.1-0.RHEL3.src.rpm i386 gaim-0.82.1-0.RHEL3.i386.rpm ia64 gaim-0.82.1-0.RHEL3.ia64.rpm https://rhn.redhat.com/ Red Hat Enterprise Linux WS (v. 3) AMD64 gaim-0.82.1-0.RHEL3.x86_64.rpm SRPMS gaim-0.82.1-0.RHEL3.src.rpm i386 gaim-0.82.1-0.RHEL3.i386.rpm ia64 gaim-0.82.1-0.RHEL3.ia64.rpm https://rhn.redhat.com/ Mandrake Linux Mandrakelinux 10.0 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/gaim-0.75-5.3.100mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/gaim-encrypt-0.75-5.3.100mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/gaim-festival-0.75-5.3.100mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/gaim-perl-0.75-5.3.100mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/libgaim-remote0-0.75-5.3.100mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/libgaim-remote0-devel-0.75-5.3.100mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/SRPMS/gaim-0.75-5.3.100mdk.src.rpm AMD64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/gaim-0.75-5.3.100mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/gaim-encrypt-0.75-5.3.100mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/gaim-festival-0.75-5.3.100mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/gaim-perl-0.75-5.3.100mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/lib64gaim-remote0-0.75-5.3.100mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/lib64gaim-remote0-devel-0.75-5.3.100mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/SRPMS/gaim-0.75-5.3.100mdk.src.rpm |
|
Standar resources |
|
Property | Value |
CVE | CAN-2004-0785 |
BID | |
Other resources |
|
Gaim Security http://gaim.sourceforge.net/security/?id=3 Gaim Security http://gaim.sourceforge.net/security/?id=4 Gaim Security http://gaim.sourceforge.net/security/?id=5 Red Hat Security Advisory RHSA-2004:400-15 https://rhn.redhat.com/errata/RHSA-2004-400.html Mandrakesoft Security Advisory MDKSA-2004:110 http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:110 |
Version history |
||
Version | Comments | Date |
1.0 | Aviso emitido | 2004-09-08 |
1.1 | Aviso emitido por Mandrake (MDKSA-2004:110) | 2004-10-22 |