lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1MJqwe-0007rM-H0@titan.mandriva.com>
Date: Thu, 25 Jun 2009 17:33:00 +0200
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2009:140 ] gaim


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2009:140
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : gaim
 Date    : June 25, 2009
 Affected: Corporate 3.0
 _______________________________________________________________________

 Problem Description:

 Multiple security vulnerabilities has been identified and fixed
 in gaim:
 
 Buffer overflow in the XMPP SOCKS5 bytestream server in Pidgin before
 2.5.6 allows remote authenticated users to execute arbitrary code via
 vectors involving an outbound XMPP file transfer.  NOTE: some of these
 details are obtained from third party information (CVE-2009-1373).
 
 Multiple integer overflows in the msn_slplink_process_msg functions
 in the MSN protocol handler in (1) libpurple/protocols/msn/slplink.c
 and (2) libpurple/protocols/msnp9/slplink.c in Pidgin before 2.5.6
 on 32-bit platforms allow remote attackers to execute arbitrary code
 via a malformed SLP message with a crafted offset value, leading to
 buffer overflows.  NOTE: this issue exists because of an incomplete
 fix for CVE-2008-2927 (CVE-2009-1376).
 
 The updated packages have been patched to prevent this.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1373
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1376
 _______________________________________________________________________

 Updated Packages:

 Corporate 3.0:
 8197eff106ba6700263baebc375a3450  corporate/3.0/i586/gaim-1.5.0-0.3.C30mdk.i586.rpm
 65d29506639d6ece5f6a5ee4ff412f26  corporate/3.0/i586/gaim-devel-1.5.0-0.3.C30mdk.i586.rpm
 7df1a2e32c72e08c70fd6b97ae1cb5c4  corporate/3.0/i586/gaim-perl-1.5.0-0.3.C30mdk.i586.rpm
 a93879b845766db687d96dbaa816c9d7  corporate/3.0/i586/gaim-tcl-1.5.0-0.3.C30mdk.i586.rpm
 c55fa34819507c2a09c2be60f3b413a1  corporate/3.0/i586/libgaim-remote0-1.5.0-0.3.C30mdk.i586.rpm
 55c036de54a3c77ecbac2de7b151e831  corporate/3.0/i586/libgaim-remote0-devel-1.5.0-0.3.C30mdk.i586.rpm 
 360236b5901d1baa2a152a298a5da711  corporate/3.0/SRPMS/gaim-1.5.0-0.3.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 cb87618ff19356017bbcb64ca4a92911  corporate/3.0/x86_64/gaim-1.5.0-0.3.C30mdk.x86_64.rpm
 e53605a18922d9a38d6d27a3a33019a9  corporate/3.0/x86_64/gaim-devel-1.5.0-0.3.C30mdk.x86_64.rpm
 19a629ebdd66f13b005ed8d7cff149be  corporate/3.0/x86_64/gaim-perl-1.5.0-0.3.C30mdk.x86_64.rpm
 7f52e7d3264df5d0092e7444d6121767  corporate/3.0/x86_64/gaim-tcl-1.5.0-0.3.C30mdk.x86_64.rpm
 c341e275dd265014746a79a1c522ed9b  corporate/3.0/x86_64/lib64gaim-remote0-1.5.0-0.3.C30mdk.x86_64.rpm
 decfc6bbe51682c5c513acdc28516c6a  corporate/3.0/x86_64/lib64gaim-remote0-devel-1.5.0-0.3.C30mdk.x86_64.rpm 
 360236b5901d1baa2a152a298a5da711  corporate/3.0/SRPMS/gaim-1.5.0-0.3.C30mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFKQ3SWmqjQ0CJFipgRAkpOAKCr72MQ1svvOMiPhBaUApPdtlatGACg2Tec
1pZcIZ1hueaPhkFavgO3sVU=
=2xQd
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ