Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in gaim
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in gaim
ID: MDVSA-2009:140
Distribution: Mandriva
Plattformen: Mandriva Corporate 3.0
Datum: Do, 25. Juni 2009, 17:36
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1373
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1376
Applikationen: Pidgin

Originalnachricht

This is a multi-part message in MIME format...

------------=_1245944190-22127-259


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2009:140
http://www.mandriva.com/security/
_______________________________________________________________________

Package : gaim
Date : June 25, 2009
Affected: Corporate 3.0
_______________________________________________________________________

Problem Description:

Multiple security vulnerabilities has been identified and fixed
in gaim:

Buffer overflow in the XMPP SOCKS5 bytestream server in Pidgin before
2.5.6 allows remote authenticated users to execute arbitrary code via
vectors involving an outbound XMPP file transfer. NOTE: some of these
details are obtained from third party information (CVE-2009-1373).

Multiple integer overflows in the msn_slplink_process_msg functions
in the MSN protocol handler in (1) libpurple/protocols/msn/slplink.c
and (2) libpurple/protocols/msnp9/slplink.c in Pidgin before 2.5.6
on 32-bit platforms allow remote attackers to execute arbitrary code
via a malformed SLP message with a crafted offset value, leading to
buffer overflows. NOTE: this issue exists because of an incomplete
fix for CVE-2008-2927 (CVE-2009-1376).

The updated packages have been patched to prevent this.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1373
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1376
_______________________________________________________________________

Updated Packages:

Corporate 3.0:
8197eff106ba6700263baebc375a3450
corporate/3.0/i586/gaim-1.5.0-0.3.C30mdk.i586.rpm
65d29506639d6ece5f6a5ee4ff412f26
corporate/3.0/i586/gaim-devel-1.5.0-0.3.C30mdk.i586.rpm
7df1a2e32c72e08c70fd6b97ae1cb5c4
corporate/3.0/i586/gaim-perl-1.5.0-0.3.C30mdk.i586.rpm
a93879b845766db687d96dbaa816c9d7
corporate/3.0/i586/gaim-tcl-1.5.0-0.3.C30mdk.i586.rpm
c55fa34819507c2a09c2be60f3b413a1
corporate/3.0/i586/libgaim-remote0-1.5.0-0.3.C30mdk.i586.rpm
55c036de54a3c77ecbac2de7b151e831
corporate/3.0/i586/libgaim-remote0-devel-1.5.0-0.3.C30mdk.i586.rpm
360236b5901d1baa2a152a298a5da711
corporate/3.0/SRPMS/gaim-1.5.0-0.3.C30mdk.src.rpm

Corporate 3.0/X86_64:
cb87618ff19356017bbcb64ca4a92911
corporate/3.0/x86_64/gaim-1.5.0-0.3.C30mdk.x86_64.rpm
e53605a18922d9a38d6d27a3a33019a9
corporate/3.0/x86_64/gaim-devel-1.5.0-0.3.C30mdk.x86_64.rpm
19a629ebdd66f13b005ed8d7cff149be
corporate/3.0/x86_64/gaim-perl-1.5.0-0.3.C30mdk.x86_64.rpm
7f52e7d3264df5d0092e7444d6121767
corporate/3.0/x86_64/gaim-tcl-1.5.0-0.3.C30mdk.x86_64.rpm
c341e275dd265014746a79a1c522ed9b
corporate/3.0/x86_64/lib64gaim-remote0-1.5.0-0.3.C30mdk.x86_64.rpm
decfc6bbe51682c5c513acdc28516c6a
corporate/3.0/x86_64/lib64gaim-remote0-devel-1.5.0-0.3.C30mdk.x86_64.rpm
360236b5901d1baa2a152a298a5da711
corporate/3.0/SRPMS/gaim-1.5.0-0.3.C30mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFKQ3SWmqjQ0CJFipgRAkpOAKCr72MQ1svvOMiPhBaUApPdtlatGACg2Tec
1pZcIZ1hueaPhkFavgO3sVU=
=2xQd
-----END PGP SIGNATURE-----


------------=_1245944190-22127-259
Content-Type: text/plain; name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://www.mandrivastore.com
Join the Club : http://www.mandrivaclub.com
_______________________________________________________

------------=_1245944190-22127-259--
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung