gaim security update
|Last updated on:||2005-08-09|
|Affected Products:||Red Hat Enterprise Linux AS (v. 2.1)
Red Hat Enterprise Linux ES (v. 2.1)
Red Hat Enterprise Linux WS (v. 2.1)
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor
An updated gaim package that fixes a buffer overflow security issue is now
This update has been rated as having critical security impact by the Red
Hat Security Response Team.
Gaim is an Internet Instant Messaging client.
A heap based buffer overflow issue was discovered in the way Gaim processes
away messages. A remote attacker could send a specially crafted away
message to a Gaim user logged into AIM or ICQ which could result in
arbitrary code execution. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2005-2103 to this issue.
Users of gaim are advised to upgrade to this updated package, which
contains backported patches and is not vulnerable to this issue.
relevant to your system have been applied.
This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
|Red Hat Enterprise Linux AS (v. 2.1)|
|Red Hat Enterprise Linux ES (v. 2.1)|
|Red Hat Enterprise Linux WS (v. 2.1)|
|Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor|
|(The unlinked packages above are only available from the Red Hat Network)|
Bugs fixed (see bugzilla for more information)
165444 - CAN-2005-2103 Gaim malformed away message remote code execution
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from: