LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: October 24th, 2014
Linux Security Week: October 20th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
RedHat: Critical: gaim security update Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
RedHat Linux An updated gaim package that fixes multiple security issues is now available. This update has been rated as having critical security impact by the Red Hat Security Response Team.
- ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Critical: gaim security update
Advisory ID:       RHSA-2005:627-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2005-627.html
Issue date:        2005-08-09
Updated on:        2005-08-09
Product:           Red Hat Enterprise Linux
CVE Names:         CAN-2005-2102 CAN-2005-2103 CAN-2005-2370
- ---------------------------------------------------------------------

1. Summary:

An updated gaim package that fixes multiple security issues is now available.

This update has been rated as having critical security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

Gaim is an Internet Messaging client.

A heap based buffer overflow issue was discovered in the way Gaim processes
away messages. A remote attacker could send a specially crafted away
message to a Gaim user logged into AIM or ICQ that could result in
arbitrary code execution. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2005-2103 to this issue.

Daniel Atallah discovered a denial of service issue in Gaim. A remote
attacker could attempt to upload a file with a specially crafted name to a
user logged into AIM or ICQ, causing Gaim to crash. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2005-2102 to this issue.

A denial of service bug was found in Gaim's Gadu Gadu protocol handler. A
remote attacker could send a specially crafted message to a Gaim user
logged into Gadu Gadu, causing Gaim to crash.  Please note that this issue
only affects PPC and IBM S/390 systems running Gaim. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2005-2370 to this issue.

Users of gaim are advised to upgrade to this updated package, which
contains backported patches and is not vulnerable to these issues.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/):

165392 - CAN-2005-2370 gadu gadu memory alignment issue
165400 - CAN-2005-2102 gaim AIM invalid filename DoS
165402 - CAN-2005-2103 Gaim malformed away message remote code execution


6. RPMs required:

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/gaim-1.3.1-0.el3.3.src.rpm
dc0bc2cebe945bd90e85ad349909a1b6  gaim-1.3.1-0.el3.3.src.rpm

i386:
33c487f6fe88c3573f63bc4044997cad  gaim-1.3.1-0.el3.3.i386.rpm

ia64:
ab1a9e0a24a296ced5779462f46c26a5  gaim-1.3.1-0.el3.3.ia64.rpm

ppc:
2d58f880338491f34713a51db6aba3ec  gaim-1.3.1-0.el3.3.ppc.rpm

s390:
a0e34b7891936843e174ed7a50634536  gaim-1.3.1-0.el3.3.s390.rpm

s390x:
c3e794cd5b905baf5b29848e47a7b8b2  gaim-1.3.1-0.el3.3.s390x.rpm

x86_64:
5e8c3bf3eb8679f85774713462db8242  gaim-1.3.1-0.el3.3.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/gaim-1.3.1-0.el3.3.src.rpm
dc0bc2cebe945bd90e85ad349909a1b6  gaim-1.3.1-0.el3.3.src.rpm

i386:
33c487f6fe88c3573f63bc4044997cad  gaim-1.3.1-0.el3.3.i386.rpm

x86_64:
5e8c3bf3eb8679f85774713462db8242  gaim-1.3.1-0.el3.3.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/gaim-1.3.1-0.el3.3.src.rpm
dc0bc2cebe945bd90e85ad349909a1b6  gaim-1.3.1-0.el3.3.src.rpm

i386:
33c487f6fe88c3573f63bc4044997cad  gaim-1.3.1-0.el3.3.i386.rpm

ia64:
ab1a9e0a24a296ced5779462f46c26a5  gaim-1.3.1-0.el3.3.ia64.rpm

x86_64:
5e8c3bf3eb8679f85774713462db8242  gaim-1.3.1-0.el3.3.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/gaim-1.3.1-0.el3.3.src.rpm
dc0bc2cebe945bd90e85ad349909a1b6  gaim-1.3.1-0.el3.3.src.rpm

i386:
33c487f6fe88c3573f63bc4044997cad  gaim-1.3.1-0.el3.3.i386.rpm

ia64:
ab1a9e0a24a296ced5779462f46c26a5  gaim-1.3.1-0.el3.3.ia64.rpm

x86_64:
5e8c3bf3eb8679f85774713462db8242  gaim-1.3.1-0.el3.3.x86_64.rpm

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/gaim-1.3.1-0.el4.3.src.rpm
0dad5d23bfa33dde0464cbe7cbe05e53  gaim-1.3.1-0.el4.3.src.rpm

i386:
c7343c6cc89f9e6e3dd30a9b918a9c8e  gaim-1.3.1-0.el4.3.i386.rpm

ia64:
717a21a30f477f71d6aac3052a6f2fcb  gaim-1.3.1-0.el4.3.ia64.rpm

ppc:
c8609fd4b5cc9801ea6cd131833da6c7  gaim-1.3.1-0.el4.3.ppc.rpm

s390:
5a2aa34b2844b9916e2f2cd2c39f6bb3  gaim-1.3.1-0.el4.3.s390.rpm

s390x:
40f2ac0065deb7cfda303d2efabbf9ac  gaim-1.3.1-0.el4.3.s390x.rpm

x86_64:
7611deb734363f6dceef660f19c3f4b9  gaim-1.3.1-0.el4.3.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/gaim-1.3.1-0.el4.3.src.rpm
0dad5d23bfa33dde0464cbe7cbe05e53  gaim-1.3.1-0.el4.3.src.rpm

i386:
c7343c6cc89f9e6e3dd30a9b918a9c8e  gaim-1.3.1-0.el4.3.i386.rpm

x86_64:
7611deb734363f6dceef660f19c3f4b9  gaim-1.3.1-0.el4.3.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/gaim-1.3.1-0.el4.3.src.rpm
0dad5d23bfa33dde0464cbe7cbe05e53  gaim-1.3.1-0.el4.3.src.rpm

i386:
c7343c6cc89f9e6e3dd30a9b918a9c8e  gaim-1.3.1-0.el4.3.i386.rpm

ia64:
717a21a30f477f71d6aac3052a6f2fcb  gaim-1.3.1-0.el4.3.ia64.rpm

x86_64:
7611deb734363f6dceef660f19c3f4b9  gaim-1.3.1-0.el4.3.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/gaim-1.3.1-0.el4.3.src.rpm
0dad5d23bfa33dde0464cbe7cbe05e53  gaim-1.3.1-0.el4.3.src.rpm

i386:
c7343c6cc89f9e6e3dd30a9b918a9c8e  gaim-1.3.1-0.el4.3.i386.rpm

ia64:
717a21a30f477f71d6aac3052a6f2fcb  gaim-1.3.1-0.el4.3.ia64.rpm

x86_64:
7611deb734363f6dceef660f19c3f4b9  gaim-1.3.1-0.el4.3.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2102
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2103
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2370

8. Contact:

The Red Hat security contact is .  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Pro-Privacy Senator Wyden on Fighting the NSA From Inside the System
NIST to hypervisor admins: secure your systems
Quick PHP patch beats slow research reveal
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.