Lucene search

K
nessusThis script is Copyright (C) 2004-2021 and is owned by Tenable, Inc. or an Affiliate thereof.GENTOO_GLSA-200410-23.NASL
HistoryOct 25, 2004 - 12:00 a.m.

GLSA-200410-23 : Gaim: Multiple vulnerabilities

2004-10-2500:00:00
This script is Copyright (C) 2004-2021 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
12

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.088 Low

EPSS

Percentile

94.6%

The remote host is affected by the vulnerability described in GLSA-200410-23 (Gaim: Multiple vulnerabilities)

A possible buffer overflow exists in the code processing MSN SLP messages     (CAN-2004-0891). memcpy() was used without validating the size of the     buffer, and an incorrect buffer was used as destination under certain     circumstances. Additionally, memory allocation problems were found in the     processing of MSN SLP messages and the receiving of files. These issues     could lead Gaim to try to allocate more memory than available, resulting in     the crash of the application.

Impact :

A remote attacker could crash Gaim and possibly execute arbitrary code by     exploiting the buffer overflow.

Workaround :

There is no known workaround at this time.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Gentoo Linux Security Advisory GLSA 200410-23.
#
# The advisory text is Copyright (C) 2001-2018 Gentoo Foundation, Inc.
# and licensed under the Creative Commons - Attribution / Share Alike 
# license. See http://creativecommons.org/licenses/by-sa/3.0/
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(15559);
  script_version("1.17");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/06");

  script_cve_id("CVE-2004-0891");
  script_xref(name:"GLSA", value:"200410-23");

  script_name(english:"GLSA-200410-23 : Gaim: Multiple vulnerabilities");
  script_summary(english:"Checks for updated package(s) in /var/db/pkg");

  script_set_attribute(
    attribute:"synopsis", 
    value:
"The remote Gentoo host is missing one or more security-related
patches."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"The remote host is affected by the vulnerability described in GLSA-200410-23
(Gaim: Multiple vulnerabilities)

    A possible buffer overflow exists in the code processing MSN SLP messages
    (CAN-2004-0891). memcpy() was used without validating the size of the
    buffer, and an incorrect buffer was used as destination under certain
    circumstances. Additionally, memory allocation problems were found in the
    processing of MSN SLP messages and the receiving of files. These issues
    could lead Gaim to try to allocate more memory than available, resulting in
    the crash of the application.
  
Impact :

    A remote attacker could crash Gaim and possibly execute arbitrary code by
    exploiting the buffer overflow.
  
Workaround :

    There is no known workaround at this time."
  );
  # http://gaim.sourceforge.net/security/
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.pidgin.im/security/"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://security.gentoo.org/glsa/200410-23"
  );
  script_set_attribute(
    attribute:"solution", 
    value:
"All Gaim users should upgrade to the latest version:
    # emerge sync
    # emerge -pv '>=net-im/gaim-1.0.2'
    # emerge '>=net-im/gaim-1.0.2'"
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:gaim");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux");

  script_set_attribute(attribute:"patch_publication_date", value:"2004/10/24");
  script_set_attribute(attribute:"plugin_publication_date", value:"2004/10/25");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2004-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english:"Gentoo Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("qpkg.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo");
if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING);


flag = 0;

if (qpkg_check(package:"net-im/gaim", unaffected:make_list("ge 1.0.2"), vulnerable:make_list("lt 1.0.2"))) flag++;

if (flag)
{
  if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());
  else security_hole(0);
  exit(0);
}
else
{
  tested = qpkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "Gaim");
}
VendorProductVersionCPE
gentoolinuxgaimp-cpe:/a:gentoo:linux:gaim
gentoolinuxcpe:/o:gentoo:linux

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.088 Low

EPSS

Percentile

94.6%