diff options
author | nectar <nectar@FreeBSD.org> | 2004-02-12 23:46:17 +0800 |
---|---|---|
committer | nectar <nectar@FreeBSD.org> | 2004-02-12 23:46:17 +0800 |
commit | a671ff0c05f6b26b64914bdd1ec4536b5c823bd0 (patch) | |
tree | 61a67a97700ae944449a531a0e73a4078b0da471 /security | |
parent | ce4716830e130ba9ef380493dc3024ce60a2be28 (diff) | |
download | freebsd-ports-gnome-a671ff0c05f6b26b64914bdd1ec4536b5c823bd0.tar.gz freebsd-ports-gnome-a671ff0c05f6b26b64914bdd1ec4536b5c823bd0.tar.zst freebsd-ports-gnome-a671ff0c05f6b26b64914bdd1ec4536b5c823bd0.zip |
Note gaim's bumper crop of vulnerabilities.
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 51 |
1 files changed, 51 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 2141235f40aa..189446331624 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,57 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. "http://www.vuxml.org/dtd/vuxml-1/vuxml-10.dtd"> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="6fd02439-5d70-11d8-80e3-0020ed76ef5a"> + <topic>Several remotely exploitable buffer overflows in gaim</topic> + <affects> + <package> + <name>gaim</name> + <range><lt>0.75_3</lt></range> + <range><eq>0.75_5</eq></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Stefan Esser of e-matters found almost a dozen remotely + exploitable vulnerabilities in Gaim. From the e-matters + advisory:</p> + <blockquote cite="http://security.e-matters.de/advisories/012004.txt"> + <p>While developing a custom add-on, an integer overflow + in the handling of AIM DirectIM packets was revealed that + could lead to a remote compromise of the IM client. After + disclosing this bug to the vendor, they had to make a + hurried release because of a change in the Yahoo connection + procedure that rendered GAIM useless. Unfourtunately at the + same time a closer look onto the sourcecode revealed 11 more + vulnerabilities.</p> + + <p>The 12 identified problems range from simple standard + stack overflows, over heap overflows to an integer overflow + that can be abused to cause a heap overflow. Due to the + nature of instant messaging many of these bugs require + man-in-the-middle attacks between client and server. But the + underlying protocols are easy to implement and MIM attacks + on ordinary TCP sessions is a fairly simple task.</p> + + <p>In combination with the latest kernel vulnerabilities or + the habit of users to work as root/administrator these bugs + can result in remote root compromises.</p> + </blockquote> + </body> + </description> + <references> + <url>http://security.e-matters.de/advisories/012004.txt</url> + <cvename>CAN-2004-0005</cvename> + <cvename>CAN-2004-0006</cvename> + <cvename>CAN-2004-0007</cvename> + <cvename>CAN-2004-0008</cvename> + </references> + <dates> + <discovery>2004/01/26</discovery> + <entry>2004/02/12</entry> + </dates> + </vuln> + <vuln vid="3388eff9-5d6e-11d8-80e3-0020ed76ef5a"> <topic>Samba 3.0.x password initialization bug</topic> <affects> |