Gentoo Logo

Gaim: Remote execution of arbitrary code

Content:

1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200508-06 / Gaim
Release Date August 15, 2005
Latest Revision August 15, 2005: 01
Impact high
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
net-im/gaim < 1.5.0 >= 1.5.0 All supported architectures

Related bugreports: #102000

Synopsis

Gaim is vulnerable to a buffer overflow which could lead to the execution of arbitrary code or to a Denial of Service.

2.  Impact Information

Background

Gaim is a full featured instant messaging client which handles a variety of instant messaging protocols.

Description

Brandon Perry discovered that Gaim is vulnerable to a heap-based buffer overflow when handling away messages (CAN-2005-2103). Furthermore, Daniel Atallah discovered a vulnerability in the handling of file transfers (CAN-2005-2102).

Impact

A remote attacker could create a specially crafted away message which, when viewed by the target user, could lead to the execution of arbitrary code. Also, an attacker could send a file with a non-UTF8 filename to a user, which would result in a Denial of Service.

3.  Resolution Information

Workaround

There is no known workaround at this time.

Resolution

All Gaim users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=net-im/gaim-1.5.0"

4.  References



Print

Page updated August 15, 2005

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2014 Gentoo Foundation, Inc. Questions, Comments? Contact us.