LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: August 29th, 2014
Linux Security Week: August 25th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Debian: New gaim packages fix execution of arbitrary code Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Debian It was discovered that gaim, an multi-protocol instant messaging client, was vulnerable to several integer overflows in its MSN protocol handlers. These could allow a remote attacker to execute arbitrary code.
- ------------------------------------------------------------------------
Debian Security Advisory DSA-1610-1                  security@debian.org
http://www.debian.org/security/                               Steve Kemp
July 15, 2008                         http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package        : gaim
Vulnerability  : integer overflow
Problem type   : remote
Debian-specific: no
CVE Id(s)      : CVE-2008-2927

It was discovered that gaim, an multi-protocol instant messaging client,
was vulnerable to several integer overflows in its MSN protocol handlers.
These could allow a remote attacker to execute arbitrary code.

For the stable distribution (etch), this problem has been fixed in version
1:2.0.0+beta5-10etch1.

For the unstable distribution (sid), this package is not present.

We recommend that you upgrade your gaim package.


Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- -------------------------------

Source archives:

  http://security.debian.org/pool/updates/main/g/gaim/gaim_2.0.0+beta5-10etch1.dsc
    Size/MD5 checksum:     1143 7c07047f910aa37b5d3237d2b9c2f746
  http://security.debian.org/pool/updates/main/g/gaim/gaim_2.0.0+beta5.orig.tar.gz
    Size/MD5 checksum:  9031658 b95158280b54f7c6e61c975ac6a1b2c5
  http://security.debian.org/pool/updates/main/g/gaim/gaim_2.0.0+beta5-10etch1.diff.gz
    Size/MD5 checksum:    40297 4481186566917128436fec7894a0849e

Architecture independent packages:

  http://security.debian.org/pool/updates/main/g/gaim/gaim-data_2.0.0+beta5-10etch1_all.deb
    Size/MD5 checksum:  5155634 a771c9d07df618edbea2009b81a780eb

alpha architecture (DEC Alpha)

  http://security.debian.org/pool/updates/main/g/gaim/gaim-dbg_2.0.0+beta5-10etch1_alpha.deb
    Size/MD5 checksum:  3941786 5ae6eb63afa93956d351b436c4dedce1
  http://security.debian.org/pool/updates/main/g/gaim/gaim-dev_2.0.0+beta5-10etch1_alpha.deb
    Size/MD5 checksum:   151048 d2963922763948e431374e6035fce786
  http://security.debian.org/pool/updates/main/g/gaim/gaim_2.0.0+beta5-10etch1_alpha.deb
    Size/MD5 checksum:  1946668 a581acaee78397951203bb9ba75b92a5

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/g/gaim/gaim-dev_2.0.0+beta5-10etch1_amd64.deb
    Size/MD5 checksum:   151308 e02d048bb0b276819259b9eafb2da5c1
  http://security.debian.org/pool/updates/main/g/gaim/gaim-dbg_2.0.0+beta5-10etch1_amd64.deb
    Size/MD5 checksum:  3981722 f8dea9c85a995285842b9658b7f22e40
  http://security.debian.org/pool/updates/main/g/gaim/gaim_2.0.0+beta5-10etch1_amd64.deb
    Size/MD5 checksum:  1783578 68aa76888cdef8f740f45f50661234b1

arm architecture (ARM)

  http://security.debian.org/pool/updates/main/g/gaim/gaim-dbg_2.0.0+beta5-10etch1_arm.deb
    Size/MD5 checksum:  3755878 f5fab49dc1d45ea2a6b5c57a52402cf9
  http://security.debian.org/pool/updates/main/g/gaim/gaim-dev_2.0.0+beta5-10etch1_arm.deb
    Size/MD5 checksum:   151974 65cb42b3add06b9e623d14199c4f1955
  http://security.debian.org/pool/updates/main/g/gaim/gaim_2.0.0+beta5-10etch1_arm.deb
    Size/MD5 checksum:  1562534 cbde10538a351b4f7730a76c3d0d24d7

hppa architecture (HP PA RISC)

  http://security.debian.org/pool/updates/main/g/gaim/gaim-dbg_2.0.0+beta5-10etch1_hppa.deb
    Size/MD5 checksum:  3885888 c6ecba97d3da131f507be4bb829f30d0
  http://security.debian.org/pool/updates/main/g/gaim/gaim-dev_2.0.0+beta5-10etch1_hppa.deb
    Size/MD5 checksum:   151626 bd76b163486f8a778bea8a3cae124d66
  http://security.debian.org/pool/updates/main/g/gaim/gaim_2.0.0+beta5-10etch1_hppa.deb
    Size/MD5 checksum:  1982362 4c523a86d49a58204ef226d8b003adea

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/g/gaim/gaim_2.0.0+beta5-10etch1_i386.deb
    Size/MD5 checksum:  1680010 33ada7f2c9454fe220feac62252ddb6f
  http://security.debian.org/pool/updates/main/g/gaim/gaim-dbg_2.0.0+beta5-10etch1_i386.deb
    Size/MD5 checksum:  3753710 6a1c030a5bd9ed092d108d54b99e64ca
  http://security.debian.org/pool/updates/main/g/gaim/gaim-dev_2.0.0+beta5-10etch1_i386.deb
    Size/MD5 checksum:   151968 4132986afae49a8640f5e4a2c793da30

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/g/gaim/gaim_2.0.0+beta5-10etch1_ia64.deb
    Size/MD5 checksum:  2446022 006e57d747b574fe007531dea875b1e7
  http://security.debian.org/pool/updates/main/g/gaim/gaim-dev_2.0.0+beta5-10etch1_ia64.deb
    Size/MD5 checksum:   149394 3374fa4ef91014f880840b35d38d31c5
  http://security.debian.org/pool/updates/main/g/gaim/gaim-dbg_2.0.0+beta5-10etch1_ia64.deb
    Size/MD5 checksum:  3734170 690c1bb55de9f185016eff981c4808b9

mips architecture (MIPS (Big Endian))

  http://security.debian.org/pool/updates/main/g/gaim/gaim-dev_2.0.0+beta5-10etch1_mips.deb
    Size/MD5 checksum:   150720 311032a9ac626069ccc86f84f57e2590
  http://security.debian.org/pool/updates/main/g/gaim/gaim-dbg_2.0.0+beta5-10etch1_mips.deb
    Size/MD5 checksum:  4038460 e64238f554102f276d1318ec1306a576
  http://security.debian.org/pool/updates/main/g/gaim/gaim_2.0.0+beta5-10etch1_mips.deb
    Size/MD5 checksum:  1477582 b8161f8051c1ef3bfcabae5fda5a8e86

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/g/gaim/gaim_2.0.0+beta5-10etch1_powerpc.deb
    Size/MD5 checksum:  1736680 1fd924e136faa010fc72bdd5380bae7b
  http://security.debian.org/pool/updates/main/g/gaim/gaim-dev_2.0.0+beta5-10etch1_powerpc.deb
    Size/MD5 checksum:   149416 c39f12e2db475a607635cadef7cf2d0d
  http://security.debian.org/pool/updates/main/g/gaim/gaim-dbg_2.0.0+beta5-10etch1_powerpc.deb
    Size/MD5 checksum:  3962580 5f96851de05f64a1004f259163c78a62

s390 architecture (IBM S/390)

  http://security.debian.org/pool/updates/main/g/gaim/gaim-dbg_2.0.0+beta5-10etch1_s390.deb
    Size/MD5 checksum:  3887734 8a70aab0641f3133d09e92236209d599
  http://security.debian.org/pool/updates/main/g/gaim/gaim-dev_2.0.0+beta5-10etch1_s390.deb
    Size/MD5 checksum:   149390 02297def8b72438af93b378283b3f804
  http://security.debian.org/pool/updates/main/g/gaim/gaim_2.0.0+beta5-10etch1_s390.deb
    Size/MD5 checksum:  1724846 b2be967dbcbb3fb08d094facfc72feb4

sparc architecture (Sun SPARC/UltraSPARC)

  http://security.debian.org/pool/updates/main/g/gaim/gaim-dbg_2.0.0+beta5-10etch1_sparc.deb
    Size/MD5 checksum:  3619054 e7496134eb752f245b5d7cb0be0cf104
  http://security.debian.org/pool/updates/main/g/gaim/gaim_2.0.0+beta5-10etch1_sparc.deb
    Size/MD5 checksum:  1660690 0ef1fe66d2513f3521f76295a4d4fa6b
  http://security.debian.org/pool/updates/main/g/gaim/gaim-dev_2.0.0+beta5-10etch1_sparc.deb
    Size/MD5 checksum:   149410 810e9119e56cc591275761110cfef793


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
How Cops and Hackers Could Abuse California’s New Phone Kill-Switch Law
Why Russian hackers are beating us
DQ Breach? HQ Says No, But Would it Know?
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.