Skip to navigation

Security Advisory gaim security update

Advisory: RHSA-2004:400-15
Type: Security Advisory
Severity: Critical
Issued on: 2004-09-07
Last updated on: 2004-09-07
Affected Products: Red Hat Desktop (v. 3)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux WS (v. 3)
CVEs (cve.mitre.org): CVE-2004-0500
CVE-2004-0754
CVE-2004-0784
CVE-2004-0785

Details

An updated gaim package that fixes several security issues is now available.

Gaim is an instant messenger client that can handle multiple protocols.

Buffer overflow bugs were found in the Gaim MSN protocol handler. In order
to exploit these bugs, an attacker would have to perform a man in the
middle attack between the MSN server and the vulnerable Gaim client. Such
an attack could allow arbitrary code execution. The Common Vulnerabilities
and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0500
to this issue.

Buffer overflow bugs have been found in the Gaim URL decoder, local
hostname resolver, and the RTF message parser. It is possible that a
remote attacker could send carefully crafted data to a vulnerable client
and lead to a crash or arbitrary code execution. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2004-0785 to this issue.

A shell escape bug has been found in the Gaim smiley theme file
installation. When a user installs a smiley theme, which is contained
within a tar file, the unarchiving of the data is done in an unsafe manner.
An attacker could create a malicious smiley theme that would execute
arbitrary commands if the theme was installed by the victim. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2004-0784 to this issue.

An integer overflow bug has been found in the Gaim Groupware message
receiver. It is possible that if a user connects to a malicious server,
an attacker could send carefully crafted data which could lead to arbitrary
code execution on the victims machine. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CAN-2004-0754 to
this issue.

Users of Gaim are advised to upgrade to this updated package which
contains Gaim version 0.82 and is not vulnerable to these issues.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

Updated packages

Red Hat Desktop (v. 3)

IA-32:
gaim-0.82.1-0.RHEL3.i386.rpm
File outdated by:  RHBA-2006:0135
    MD5: 16a0c2078927b793b9186eeb83e93be0
 
x86_64:
gaim-0.82.1-0.RHEL3.x86_64.rpm
File outdated by:  RHBA-2006:0135
    MD5: 9091ab5c18b428e8cf933e2a0767fb77
 
Red Hat Enterprise Linux AS (v. 3)

IA-32:
gaim-0.82.1-0.RHEL3.i386.rpm
File outdated by:  RHBA-2006:0135
    MD5: 16a0c2078927b793b9186eeb83e93be0
 
IA-64:
gaim-0.82.1-0.RHEL3.ia64.rpm
File outdated by:  RHBA-2006:0135
    MD5: 9f88b162909aafb41bca2ad76c5faf45
 
PPC:
gaim-0.82.1-0.RHEL3.ppc.rpm
File outdated by:  RHBA-2006:0135
    MD5: 7f37d28cb2c1e5b9c87807afff904147
 
s390:
gaim-0.82.1-0.RHEL3.s390.rpm
File outdated by:  RHBA-2006:0135
    MD5: 892285056f0b54a4b460ac2bb37a9fd2
 
s390x:
gaim-0.82.1-0.RHEL3.s390x.rpm
File outdated by:  RHBA-2006:0135
    MD5: b123c085ecb9ec973266b7b68c410c9c
 
x86_64:
gaim-0.82.1-0.RHEL3.x86_64.rpm
File outdated by:  RHBA-2006:0135
    MD5: 9091ab5c18b428e8cf933e2a0767fb77
 
Red Hat Enterprise Linux ES (v. 3)

IA-32:
gaim-0.82.1-0.RHEL3.i386.rpm
File outdated by:  RHBA-2006:0135
    MD5: 16a0c2078927b793b9186eeb83e93be0
 
IA-64:
gaim-0.82.1-0.RHEL3.ia64.rpm
File outdated by:  RHBA-2006:0135
    MD5: 9f88b162909aafb41bca2ad76c5faf45
 
x86_64:
gaim-0.82.1-0.RHEL3.x86_64.rpm
File outdated by:  RHBA-2006:0135
    MD5: 9091ab5c18b428e8cf933e2a0767fb77
 
Red Hat Enterprise Linux WS (v. 3)

IA-32:
gaim-0.82.1-0.RHEL3.i386.rpm
File outdated by:  RHBA-2006:0135
    MD5: 16a0c2078927b793b9186eeb83e93be0
 
IA-64:
gaim-0.82.1-0.RHEL3.ia64.rpm
File outdated by:  RHBA-2006:0135
    MD5: 9f88b162909aafb41bca2ad76c5faf45
 
x86_64:
gaim-0.82.1-0.RHEL3.x86_64.rpm
File outdated by:  RHBA-2006:0135
    MD5: 9091ab5c18b428e8cf933e2a0767fb77
 

Bugs fixed (see bugzilla for more information)

126842 - CAN-2004-0500 Gaim MSN protocol vulnerabilities


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/