RHSA-2004:604
Vulnerability from csaf_redhat - Published: 2004-10-20 19:47 - Updated: 2004-10-20 00:00Summary
Red Hat Security Advisory: gaim security update
Notes
Topic
An updated gaim package that fixes security issues, fixes various bugs, and
includes various enhancements for Red Hat Enterprise Linux 3 is now avaliable.
Details
The gaim application is a multi-protocol instant messaging client.
A buffer overflow has been discovered in the MSN protocol handler. When
receiving unexpected sequence of MSNSLP messages, it is possible that an
attacker could cause an internal buffer overflow, leading to a crash or
possible code execution. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2004-0891 to this issue.
This updated gaim package also fixes multiple user interface, protocol, and
error handling problems, including an ICQ communication encoding issue.
Additionally, these updated packages have compiled gaim as a PIE (position
independent executable) for added protection against future security
vulnerabilities.
All users of gaim should upgrade to this updated package, which includes
various bug fixes, as well as a backported security patch.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 2023 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An updated gaim package that fixes security issues, fixes various bugs, and\nincludes various enhancements for Red Hat Enterprise Linux 3 is now avaliable.",
"title": "Topic"
},
{
"category": "general",
"text": "The gaim application is a multi-protocol instant messaging client.\n\nA buffer overflow has been discovered in the MSN protocol handler. When\nreceiving unexpected sequence of MSNSLP messages, it is possible that an\nattacker could cause an internal buffer overflow, leading to a crash or\npossible code execution. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2004-0891 to this issue.\n\nThis updated gaim package also fixes multiple user interface, protocol, and\nerror handling problems, including an ICQ communication encoding issue.\n\nAdditionally, these updated packages have compiled gaim as a PIE (position\nindependent executable) for added protection against future security\nvulnerabilities.\n\nAll users of gaim should upgrade to this updated package, which includes\nvarious bug fixes, as well as a backported security patch.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2004:604",
"url": "https://access.redhat.com/errata/RHSA-2004:604"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/data/csaf/v2/advisories/2004/rhsa-2004_604.json"
}
],
"title": "Red Hat Security Advisory: gaim security update",
"tracking": {
"current_release_date": "2004-10-20T00:00:00Z",
"generator": {
"date": "2023-06-30T19:10:00Z",
"engine": {
"name": "Red Hat SDEngine",
"version": "3.18.0"
}
},
"id": "RHSA-2004:604",
"initial_release_date": "2004-10-20T19:47:00Z",
"revision_history": [
{
"date": "2004-10-20T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_family",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "Red Hat Enterprise Linux"
}
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2004-0891",
"ids": [
{
"system_name": "Red Hat Bugzilla",
"text": "https://bugzilla.redhat.com/show_bug.cgi?id=1617316"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in the MSN protocol handler for gaim 0.79 to 1.0.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an \"unexpected sequence of MSNSLP messages\" that results in an unbounded copy operation that writes to the wrong buffer.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux"
]
},
"references": [
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2004-0891",
"url": "https://www.cve.org/CVERecord?id=CVE-2004-0891"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0891",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0891"
},
{
"category": "external",
"summary": "CVE-2004-0891",
"url": "https://access.redhat.com/security/cve/CVE-2004-0891"
},
{
"category": "external",
"summary": "bz#1617316: CVE-2004-0891 security flaw",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617316"
}
],
"release_date": "2004-10-19T00:00:00Z",
"remediations": [
{
"category": "vendor_fix",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"product_ids": [
"Red Hat Enterprise Linux"
],
"url": "https://access.redhat.com/errata/RHSA-2004:604"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "CVE-2004-0891 security flaw"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…