[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-disclosure] [ MDVSA-2009:140 ] gaim
- To: full-disclosure@xxxxxxxxxxxxxxxxx
- Subject: [Full-disclosure] [ MDVSA-2009:140 ] gaim
- From: security@xxxxxxxxxxxx
- Date: Thu, 25 Jun 2009 17:58:00 +0200
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2009:140
http://www.mandriva.com/security/
_______________________________________________________________________
Package : gaim
Date : June 25, 2009
Affected: Corporate 3.0
_______________________________________________________________________
Problem Description:
Multiple security vulnerabilities has been identified and fixed
in gaim:
Buffer overflow in the XMPP SOCKS5 bytestream server in Pidgin before
2.5.6 allows remote authenticated users to execute arbitrary code via
vectors involving an outbound XMPP file transfer. NOTE: some of these
details are obtained from third party information (CVE-2009-1373).
Multiple integer overflows in the msn_slplink_process_msg functions
in the MSN protocol handler in (1) libpurple/protocols/msn/slplink.c
and (2) libpurple/protocols/msnp9/slplink.c in Pidgin before 2.5.6
on 32-bit platforms allow remote attackers to execute arbitrary code
via a malformed SLP message with a crafted offset value, leading to
buffer overflows. NOTE: this issue exists because of an incomplete
fix for CVE-2008-2927 (CVE-2009-1376).
The updated packages have been patched to prevent this.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1373
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1376
_______________________________________________________________________
Updated Packages:
Corporate 3.0:
8197eff106ba6700263baebc375a3450
corporate/3.0/i586/gaim-1.5.0-0.3.C30mdk.i586.rpm
65d29506639d6ece5f6a5ee4ff412f26
corporate/3.0/i586/gaim-devel-1.5.0-0.3.C30mdk.i586.rpm
7df1a2e32c72e08c70fd6b97ae1cb5c4
corporate/3.0/i586/gaim-perl-1.5.0-0.3.C30mdk.i586.rpm
a93879b845766db687d96dbaa816c9d7
corporate/3.0/i586/gaim-tcl-1.5.0-0.3.C30mdk.i586.rpm
c55fa34819507c2a09c2be60f3b413a1
corporate/3.0/i586/libgaim-remote0-1.5.0-0.3.C30mdk.i586.rpm
55c036de54a3c77ecbac2de7b151e831
corporate/3.0/i586/libgaim-remote0-devel-1.5.0-0.3.C30mdk.i586.rpm
360236b5901d1baa2a152a298a5da711
corporate/3.0/SRPMS/gaim-1.5.0-0.3.C30mdk.src.rpm
Corporate 3.0/X86_64:
cb87618ff19356017bbcb64ca4a92911
corporate/3.0/x86_64/gaim-1.5.0-0.3.C30mdk.x86_64.rpm
e53605a18922d9a38d6d27a3a33019a9
corporate/3.0/x86_64/gaim-devel-1.5.0-0.3.C30mdk.x86_64.rpm
19a629ebdd66f13b005ed8d7cff149be
corporate/3.0/x86_64/gaim-perl-1.5.0-0.3.C30mdk.x86_64.rpm
7f52e7d3264df5d0092e7444d6121767
corporate/3.0/x86_64/gaim-tcl-1.5.0-0.3.C30mdk.x86_64.rpm
c341e275dd265014746a79a1c522ed9b
corporate/3.0/x86_64/lib64gaim-remote0-1.5.0-0.3.C30mdk.x86_64.rpm
decfc6bbe51682c5c513acdc28516c6a
corporate/3.0/x86_64/lib64gaim-remote0-devel-1.5.0-0.3.C30mdk.x86_64.rpm
360236b5901d1baa2a152a298a5da711
corporate/3.0/SRPMS/gaim-1.5.0-0.3.C30mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFKQ3SWmqjQ0CJFipgRAkpOAKCr72MQ1svvOMiPhBaUApPdtlatGACg2Tec
1pZcIZ1hueaPhkFavgO3sVU=
=2xQd
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/