[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1MJrLo-0007uj-Kk@titan.mandriva.com>
Date: Thu, 25 Jun 2009 17:59:00 +0200
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDVSA-2009:140 ] gaim
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2009:140
http://www.mandriva.com/security/
_______________________________________________________________________
Package : gaim
Date : June 25, 2009
Affected: Corporate 3.0
_______________________________________________________________________
Problem Description:
Multiple security vulnerabilities has been identified and fixed
in gaim:
Buffer overflow in the XMPP SOCKS5 bytestream server in Pidgin before
2.5.6 allows remote authenticated users to execute arbitrary code via
vectors involving an outbound XMPP file transfer. NOTE: some of these
details are obtained from third party information (CVE-2009-1373).
Multiple integer overflows in the msn_slplink_process_msg functions
in the MSN protocol handler in (1) libpurple/protocols/msn/slplink.c
and (2) libpurple/protocols/msnp9/slplink.c in Pidgin before 2.5.6
on 32-bit platforms allow remote attackers to execute arbitrary code
via a malformed SLP message with a crafted offset value, leading to
buffer overflows. NOTE: this issue exists because of an incomplete
fix for CVE-2008-2927 (CVE-2009-1376).
The updated packages have been patched to prevent this.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1373
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1376
_______________________________________________________________________
Updated Packages:
Corporate 3.0:
8197eff106ba6700263baebc375a3450 corporate/3.0/i586/gaim-1.5.0-0.3.C30mdk.i586.rpm
65d29506639d6ece5f6a5ee4ff412f26 corporate/3.0/i586/gaim-devel-1.5.0-0.3.C30mdk.i586.rpm
7df1a2e32c72e08c70fd6b97ae1cb5c4 corporate/3.0/i586/gaim-perl-1.5.0-0.3.C30mdk.i586.rpm
a93879b845766db687d96dbaa816c9d7 corporate/3.0/i586/gaim-tcl-1.5.0-0.3.C30mdk.i586.rpm
c55fa34819507c2a09c2be60f3b413a1 corporate/3.0/i586/libgaim-remote0-1.5.0-0.3.C30mdk.i586.rpm
55c036de54a3c77ecbac2de7b151e831 corporate/3.0/i586/libgaim-remote0-devel-1.5.0-0.3.C30mdk.i586.rpm
360236b5901d1baa2a152a298a5da711 corporate/3.0/SRPMS/gaim-1.5.0-0.3.C30mdk.src.rpm
Corporate 3.0/X86_64:
cb87618ff19356017bbcb64ca4a92911 corporate/3.0/x86_64/gaim-1.5.0-0.3.C30mdk.x86_64.rpm
e53605a18922d9a38d6d27a3a33019a9 corporate/3.0/x86_64/gaim-devel-1.5.0-0.3.C30mdk.x86_64.rpm
19a629ebdd66f13b005ed8d7cff149be corporate/3.0/x86_64/gaim-perl-1.5.0-0.3.C30mdk.x86_64.rpm
7f52e7d3264df5d0092e7444d6121767 corporate/3.0/x86_64/gaim-tcl-1.5.0-0.3.C30mdk.x86_64.rpm
c341e275dd265014746a79a1c522ed9b corporate/3.0/x86_64/lib64gaim-remote0-1.5.0-0.3.C30mdk.x86_64.rpm
decfc6bbe51682c5c513acdc28516c6a corporate/3.0/x86_64/lib64gaim-remote0-devel-1.5.0-0.3.C30mdk.x86_64.rpm
360236b5901d1baa2a152a298a5da711 corporate/3.0/SRPMS/gaim-1.5.0-0.3.C30mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFKQ3SWmqjQ0CJFipgRAkpOAKCr72MQ1svvOMiPhBaUApPdtlatGACg2Tec
1pZcIZ1hueaPhkFavgO3sVU=
=2xQd
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists