gaim, php security update

2005-05-11T14:48:17
ID CESA-2005:429
Type centos
Reporter CentOS Project
Modified 2005-05-12T00:26:03

Description

CentOS Errata and Security Advisory CESA-2005:429

The Gaim application is a multi-protocol instant messaging client.

A stack based buffer overflow bug was found in the way gaim processes a message containing a URL. A remote attacker could send a carefully crafted message resulting in the execution of arbitrary code on a victim's machine. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-1261 to this issue.

A bug was found in the way gaim handles malformed MSN messages. A remote attacker could send a carefully crafted MSN message causing gaim to crash. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-1262 to this issue.

Users of Gaim are advised to upgrade to this updated package which contains backported patches and is not vulnerable to these issues.

Merged security bulletin from advisories: http://lists.centos.org/pipermail/centos-announce/2005-May/011639.html http://lists.centos.org/pipermail/centos-announce/2005-May/011640.html http://lists.centos.org/pipermail/centos-announce/2005-May/011641.html http://lists.centos.org/pipermail/centos-announce/2005-May/011647.html http://lists.centos.org/pipermail/centos-announce/2005-May/011652.html http://lists.centos.org/pipermail/centos-announce/2005-May/011653.html http://lists.centos.org/pipermail/centos-announce/2005-May/011658.html

Affected packages: gaim php

Upstream details at: https://rhn.redhat.com/errata/RHSA-2005-429.html