ID OPENVAS:52140 Type openvas Reporter Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com Modified 2016-09-20T00:00:00
Description
The remote host is missing an update to the system
as announced in the referenced advisory.
#
#VID ecf68408-a9f5-11d9-a788-0001020eed82
# OpenVAS Vulnerability Test
# $
# Description: Auto generated from vuxml or freebsd advisories
#
# Authors:
# Thomas Reinke <reinke@securityspace.com>
#
# Copyright:
# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com
# Text descriptions are largely excerpted from the referenced
# advisories, and are Copyright (c) the respective author(s)
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2,
# as published by the Free Software Foundation
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
#
include("revisions-lib.inc");
tag_insight = "The following packages are affected:
gaim
ja-gaim
ko-gaim
ru-gaim
CVE-2005-0967
Gaim 1.2.0 allows remote attackers to cause a denial of service
(application crash) via a malformed file transfer request to a Jabber
user, which leads to an out-of-bounds read.";
tag_solution = "Update your system with the appropriate patches or
software upgrades.
http://gaim.sourceforge.net/security/?id=15
http://www.vuxml.org/freebsd/ecf68408-a9f5-11d9-a788-0001020eed82.html";
tag_summary = "The remote host is missing an update to the system
as announced in the referenced advisory.";
if(description)
{
script_id(52140);
script_version("$Revision: 4118 $");
script_tag(name:"last_modification", value:"$Date: 2016-09-20 07:32:38 +0200 (Tue, 20 Sep 2016) $");
script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
script_cve_id("CVE-2005-0967");
script_bugtraq_id(13004);
script_tag(name:"cvss_base", value:"5.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:P");
script_name("FreeBSD Ports: gaim, ja-gaim, ko-gaim, ru-gaim");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com");
script_family("FreeBSD Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/freebsdrel", "login/SSH/success");
script_tag(name : "insight" , value : tag_insight);
script_tag(name : "solution" , value : tag_solution);
script_tag(name : "summary" , value : tag_summary);
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
#
# The script code starts here
#
include("pkg-lib-bsd.inc");
txt = "";
vuln = 0;
bver = portver(pkg:"gaim");
if(!isnull(bver) && revcomp(a:bver, b:"1.2.1")<0) {
txt += 'Package gaim version ' + bver + ' is installed which is known to be vulnerable.\n';
vuln = 1;
}
bver = portver(pkg:"ja-gaim");
if(!isnull(bver) && revcomp(a:bver, b:"1.2.1")<0) {
txt += 'Package ja-gaim version ' + bver + ' is installed which is known to be vulnerable.\n';
vuln = 1;
}
bver = portver(pkg:"ko-gaim");
if(!isnull(bver) && revcomp(a:bver, b:"1.2.1")<0) {
txt += 'Package ko-gaim version ' + bver + ' is installed which is known to be vulnerable.\n';
vuln = 1;
}
bver = portver(pkg:"ru-gaim");
if(!isnull(bver) && revcomp(a:bver, b:"1.2.1")<0) {
txt += 'Package ru-gaim version ' + bver + ' is installed which is known to be vulnerable.\n';
vuln = 1;
}
if(vuln) {
security_message(data:string(txt));
} else if (__pkg_match) {
exit(99); # Not vulnerable.
}
{"id": "OPENVAS:52140", "type": "openvas", "bulletinFamily": "scanner", "title": "FreeBSD Ports: gaim, ja-gaim, ko-gaim, ru-gaim", "description": "The remote host is missing an update to the system\nas announced in the referenced advisory.", "published": "2008-09-04T00:00:00", "modified": "2016-09-20T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "http://plugins.openvas.org/nasl.php?oid=52140", "reporter": "Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com", "references": [], "cvelist": ["CVE-2005-0967"], "lastseen": "2017-07-02T21:10:13", "viewCount": 0, "enchantments": {"score": {"value": 6.1, "vector": "NONE", "modified": "2017-07-02T21:10:13", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2005-0967"]}, {"type": "osvdb", "idList": ["OSVDB:15278"]}, {"type": "nessus", "idList": ["UBUNTU_USN-125-1.NASL", "MANDRAKE_MDKSA-2005-071.NASL", "REDHAT-RHSA-2005-365.NASL", "FREEBSD_PKG_ECF68408A9F511D9A7880001020EED82.NASL", "CENTOS_RHSA-2005-365.NASL", "GENTOO_GLSA-200504-05.NASL"]}, {"type": "freebsd", "idList": ["ECF68408-A9F5-11D9-A788-0001020EED82"]}, {"type": "ubuntu", "idList": ["USN-125-1"]}, {"type": "openvas", "idList": ["OPENVAS:54907"]}, {"type": "redhat", "idList": ["RHSA-2005:365"]}, {"type": "gentoo", "idList": ["GLSA-200504-05"]}, {"type": "centos", "idList": ["CESA-2005:365"]}, {"type": "suse", "idList": ["SUSE-SA:2005:036"]}], "modified": "2017-07-02T21:10:13", "rev": 2}, "vulnersScore": 6.1}, "pluginID": "52140", "sourceData": "#\n#VID ecf68408-a9f5-11d9-a788-0001020eed82\n# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from vuxml or freebsd advisories\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The following packages are affected:\n gaim\n ja-gaim\n ko-gaim\n ru-gaim\n\nCVE-2005-0967\nGaim 1.2.0 allows remote attackers to cause a denial of service\n(application crash) via a malformed file transfer request to a Jabber\nuser, which leads to an out-of-bounds read.\";\ntag_solution = \"Update your system with the appropriate patches or\nsoftware upgrades.\n\nhttp://gaim.sourceforge.net/security/?id=15\nhttp://www.vuxml.org/freebsd/ecf68408-a9f5-11d9-a788-0001020eed82.html\";\ntag_summary = \"The remote host is missing an update to the system\nas announced in the referenced advisory.\";\n\n\nif(description)\n{\n script_id(52140);\n script_version(\"$Revision: 4118 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2016-09-20 07:32:38 +0200 (Tue, 20 Sep 2016) $\");\n script_tag(name:\"creation_date\", value:\"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)\");\n script_cve_id(\"CVE-2005-0967\");\n script_bugtraq_id(13004);\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_name(\"FreeBSD Ports: gaim, ja-gaim, ko-gaim, ru-gaim\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"FreeBSD Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/freebsdrel\", \"login/SSH/success\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-bsd.inc\");\n\ntxt = \"\";\nvuln = 0;\nbver = portver(pkg:\"gaim\");\nif(!isnull(bver) && revcomp(a:bver, b:\"1.2.1\")<0) {\n txt += 'Package gaim version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nbver = portver(pkg:\"ja-gaim\");\nif(!isnull(bver) && revcomp(a:bver, b:\"1.2.1\")<0) {\n txt += 'Package ja-gaim version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nbver = portver(pkg:\"ko-gaim\");\nif(!isnull(bver) && revcomp(a:bver, b:\"1.2.1\")<0) {\n txt += 'Package ko-gaim version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nbver = portver(pkg:\"ru-gaim\");\nif(!isnull(bver) && revcomp(a:bver, b:\"1.2.1\")<0) {\n txt += 'Package ru-gaim version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\n\nif(vuln) {\n security_message(data:string(txt));\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "naslFamily": "FreeBSD Local Security Checks"}
{"cve": [{"lastseen": "2021-02-02T05:24:35", "description": "Gaim 1.2.0 allows remote attackers to cause a denial of service (application crash) via a malformed file transfer request to a Jabber user, which leads to an out-of-bounds read.", "edition": 4, "cvss3": {}, "published": "2005-05-02T04:00:00", "title": "CVE-2005-0967", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2005-0967"], "modified": "2018-10-19T15:31:00", "cpe": ["cpe:/a:rob_flynn:gaim:1.2.0"], "id": "CVE-2005-0967", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-0967", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:rob_flynn:gaim:1.2.0:*:*:*:*:*:*:*"]}], "osvdb": [{"lastseen": "2017-04-28T13:20:11", "bulletinFamily": "software", "cvelist": ["CVE-2005-0967"], "edition": 1, "description": "## Vulnerability Description\nGaim contains a flaw that may allow a remote denial of service. The issue is triggered when requesting a malformed file transfer via the Jabber protocol, which causes the application to crash resulting in a loss of availability.\n## Solution Description\nUpgrade to version 1.2.1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## Short Description\nGaim contains a flaw that may allow a remote denial of service. The issue is triggered when requesting a malformed file transfer via the Jabber protocol, which causes the application to crash resulting in a loss of availability.\n## References:\nVendor URL: http://gaim.sourceforge.net/\n[Vendor Specific Advisory URL](http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000949)\n[Vendor Specific Advisory URL](http://gaim.sourceforge.net/security/index.php?id=15)\nSecurity Tracker: 1013645\n[Secunia Advisory ID:14815](https://secuniaresearch.flexerasoftware.com/advisories/14815/)\n[Secunia Advisory ID:14952](https://secuniaresearch.flexerasoftware.com/advisories/14952/)\n[Secunia Advisory ID:15059](https://secuniaresearch.flexerasoftware.com/advisories/15059/)\n[Secunia Advisory ID:16050](https://secuniaresearch.flexerasoftware.com/advisories/16050/)\n[Secunia Advisory ID:15364](https://secuniaresearch.flexerasoftware.com/advisories/15364/)\n[Secunia Advisory ID:14947](https://secuniaresearch.flexerasoftware.com/advisories/14947/)\n[Related OSVDB ID: 15277](https://vulners.com/osvdb/OSVDB:15277)\n[Related OSVDB ID: 15276](https://vulners.com/osvdb/OSVDB:15276)\nOther Advisory URL: http://rhn.redhat.com/errata/RHSA-2005-365.html\nOther Advisory URL: http://lists.suse.com/archive/suse-security-announce/2005-Jul/0004.html\nOther Advisory URL: http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.358635\nOther Advisory URL: http://security.gentoo.org/glsa/glsa-200504-05.xml\nOther Advisory URL: http://www.mandrakesoft.com/security/advisories?name=MDKSA-2005:071\nOther Advisory URL: http://www.slackware.org/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.363712\n[CVE-2005-0967](https://vulners.com/cve/CVE-2005-0967)\n", "modified": "2005-04-04T04:02:49", "published": "2005-04-04T04:02:49", "href": "https://vulners.com/osvdb/OSVDB:15278", "id": "OSVDB:15278", "title": "Gaim Jabber Malformed File Transfer Request DoS", "type": "osvdb", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "nessus": [{"lastseen": "2021-01-07T10:51:19", "description": "The GAIM team reports :\n\nA remote jabber user can cause Gaim to crash by sending a specific\nfile transfer request.", "edition": 25, "published": "2005-07-13T00:00:00", "title": "FreeBSD : gaim -- jabber remote crash (ecf68408-a9f5-11d9-a788-0001020eed82)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-0967"], "modified": "2005-07-13T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:ko-gaim", "p-cpe:/a:freebsd:freebsd:gaim", "cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:ja-gaim", "p-cpe:/a:freebsd:freebsd:ru-gaim"], "id": "FREEBSD_PKG_ECF68408A9F511D9A7880001020EED82.NASL", "href": "https://www.tenable.com/plugins/nessus/19157", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(19157);\n script_version(\"1.17\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2005-0967\");\n script_bugtraq_id(13004);\n\n script_name(english:\"FreeBSD : gaim -- jabber remote crash (ecf68408-a9f5-11d9-a788-0001020eed82)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The GAIM team reports :\n\nA remote jabber user can cause Gaim to crash by sending a specific\nfile transfer request.\"\n );\n # http://gaim.sourceforge.net/security/?id=15\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.pidgin.im/news/security/?id=15\"\n );\n # https://vuxml.freebsd.org/freebsd/ecf68408-a9f5-11d9-a788-0001020eed82.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?397c722e\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No exploit is required\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:gaim\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:ja-gaim\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:ko-gaim\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:ru-gaim\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2005/04/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/04/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/07/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"gaim<1.2.1\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"ja-gaim<1.2.1\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"ko-gaim<1.2.1\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"ru-gaim<1.2.1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-07T10:51:56", "description": "The remote host is affected by the vulnerability described in GLSA-200504-05\n(Gaim: Denial of Service issues)\n\n Multiple vulnerabilities have been addressed in the latest release of\n Gaim:\n A buffer overread in the gaim_markup_strip_html() function,\n which is used when logging conversations (CAN-2005-0965).\n Markup tags are improperly escaped using Gaim's IRC plugin\n (CAN-2005-0966).\n Sending a specially crafted file transfer request to a Gaim Jabber\n user can trigger a crash (CAN-2005-0967).\n \nImpact :\n\n An attacker could possibly cause a Denial of Service by exploiting any\n of these vulnerabilities.\n \nWorkaround :\n\n There is no known workaround at this time.", "edition": 26, "published": "2005-04-07T00:00:00", "title": "GLSA-200504-05 : Gaim: Denial of Service issues", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-0966", "CVE-2005-0965", "CVE-2005-0967"], "modified": "2005-04-07T00:00:00", "cpe": ["cpe:/o:gentoo:linux", "p-cpe:/a:gentoo:linux:gaim"], "id": "GENTOO_GLSA-200504-05.NASL", "href": "https://www.tenable.com/plugins/nessus/17992", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 200504-05.\n#\n# The advisory text is Copyright (C) 2001-2018 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(17992);\n script_version(\"1.18\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2005-0965\", \"CVE-2005-0966\", \"CVE-2005-0967\");\n script_xref(name:\"GLSA\", value:\"200504-05\");\n\n script_name(english:\"GLSA-200504-05 : Gaim: Denial of Service issues\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-200504-05\n(Gaim: Denial of Service issues)\n\n Multiple vulnerabilities have been addressed in the latest release of\n Gaim:\n A buffer overread in the gaim_markup_strip_html() function,\n which is used when logging conversations (CAN-2005-0965).\n Markup tags are improperly escaped using Gaim's IRC plugin\n (CAN-2005-0966).\n Sending a specially crafted file transfer request to a Gaim Jabber\n user can trigger a crash (CAN-2005-0967).\n \nImpact :\n\n An attacker could possibly cause a Denial of Service by exploiting any\n of these vulnerabilities.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n # http://gaim.sourceforge.net/security/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.pidgin.im/security/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/200504-05\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All Gaim users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=net-im/gaim-1.2.1'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:gaim\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/04/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/04/07\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"net-im/gaim\", unaffected:make_list(\"ge 1.2.1\"), vulnerable:make_list(\"lt 1.2.1\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:qpkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Gaim\");\n}\n", "cvss": {"score": 6.4, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:P"}}, {"lastseen": "2021-01-07T11:51:26", "description": "More vulnerabilities have been discovered in the gaim instant\nmessaging client :\n\nA buffer overflow vulnerability was found in the way that gaim escapes\nHTML, allowing a remote attacker to send a specially crafted message\nto a gaim client and causing it to crash (CVE-2005-0965).\n\nA bug was discovered in several of gaim's IRC processing functions\nthat fail to properly remove various markup tags within an IRC\nmessage. This could allow a remote attacker to send specially crafted\nmessage to a gaim client connected to an IRC server, causing it to\ncrash (CVE-2005-0966).\n\nFinally, a problem was found in gaim's Jabber message parser that\nwould allow a remote Jabber user to send a specially crafted message\nto a gaim client, bausing it to crash (CVE-2005-0967).\n\nGaim version 1.2.1 is not vulnerable to these issues and is provided\nwith this update.", "edition": 25, "published": "2005-04-15T00:00:00", "title": "Mandrake Linux Security Advisory : gaim (MDKSA-2005:071)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-0966", "CVE-2005-0965", "CVE-2005-0967"], "modified": "2005-04-15T00:00:00", "cpe": ["p-cpe:/a:mandriva:linux:gaim-silc", "p-cpe:/a:mandriva:linux:gaim-tcl", "p-cpe:/a:mandriva:linux:lib64gaim-remote0-devel", "cpe:/o:mandrakesoft:mandrake_linux:10.1", "p-cpe:/a:mandriva:linux:gaim", "p-cpe:/a:mandriva:linux:lib64gaim-remote0", "p-cpe:/a:mandriva:linux:libgaim-remote0-devel", "p-cpe:/a:mandriva:linux:libgaim-remote0", "p-cpe:/a:mandriva:linux:gaim-perl", "x-cpe:/o:mandrakesoft:mandrake_linux:le2005", "p-cpe:/a:mandriva:linux:gaim-gevolution", "p-cpe:/a:mandriva:linux:gaim-devel"], "id": "MANDRAKE_MDKSA-2005-071.NASL", "href": "https://www.tenable.com/plugins/nessus/18052", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandrake Linux Security Advisory MDKSA-2005:071. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(18052);\n script_version(\"1.18\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2005-0965\", \"CVE-2005-0966\", \"CVE-2005-0967\");\n script_xref(name:\"MDKSA\", value:\"2005:071\");\n\n script_name(english:\"Mandrake Linux Security Advisory : gaim (MDKSA-2005:071)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandrake Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"More vulnerabilities have been discovered in the gaim instant\nmessaging client :\n\nA buffer overflow vulnerability was found in the way that gaim escapes\nHTML, allowing a remote attacker to send a specially crafted message\nto a gaim client and causing it to crash (CVE-2005-0965).\n\nA bug was discovered in several of gaim's IRC processing functions\nthat fail to properly remove various markup tags within an IRC\nmessage. This could allow a remote attacker to send specially crafted\nmessage to a gaim client connected to an IRC server, causing it to\ncrash (CVE-2005-0966).\n\nFinally, a problem was found in gaim's Jabber message parser that\nwould allow a remote Jabber user to send a specially crafted message\nto a gaim client, bausing it to crash (CVE-2005-0967).\n\nGaim version 1.2.1 is not vulnerable to these issues and is provided\nwith this update.\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:gaim\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:gaim-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:gaim-gevolution\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:gaim-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:gaim-silc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:gaim-tcl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64gaim-remote0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64gaim-remote0-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libgaim-remote0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libgaim-remote0-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandrakesoft:mandrake_linux:10.1\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:mandrakesoft:mandrake_linux:le2005\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/04/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/04/15\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK10.1\", reference:\"gaim-1.2.1-0.1.101mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.1\", reference:\"gaim-devel-1.2.1-0.1.101mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.1\", reference:\"gaim-gevolution-1.2.1-0.1.101mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.1\", reference:\"gaim-perl-1.2.1-0.1.101mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.1\", reference:\"gaim-tcl-1.2.1-0.1.101mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.1\", cpu:\"x86_64\", reference:\"lib64gaim-remote0-1.2.1-0.1.101mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.1\", cpu:\"x86_64\", reference:\"lib64gaim-remote0-devel-1.2.1-0.1.101mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.1\", cpu:\"i386\", reference:\"libgaim-remote0-1.2.1-0.1.101mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.1\", cpu:\"i386\", reference:\"libgaim-remote0-devel-1.2.1-0.1.101mdk\", yank:\"mdk\")) flag++;\n\nif (rpm_check(release:\"MDK10.2\", reference:\"gaim-1.2.1-0.1.102mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.2\", reference:\"gaim-devel-1.2.1-0.1.102mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.2\", reference:\"gaim-gevolution-1.2.1-0.1.102mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.2\", reference:\"gaim-perl-1.2.1-0.1.102mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.2\", reference:\"gaim-silc-1.2.1-0.1.102mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.2\", reference:\"gaim-tcl-1.2.1-0.1.102mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.2\", cpu:\"x86_64\", reference:\"lib64gaim-remote0-1.2.1-0.1.102mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.2\", cpu:\"x86_64\", reference:\"lib64gaim-remote0-devel-1.2.1-0.1.102mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.2\", cpu:\"i386\", reference:\"libgaim-remote0-1.2.1-0.1.102mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.2\", cpu:\"i386\", reference:\"libgaim-remote0-devel-1.2.1-0.1.102mdk\", yank:\"mdk\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.4, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:P"}}, {"lastseen": "2021-01-17T13:05:27", "description": "An updated gaim package that fixes multiple denial of service issues\nis now available.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe Gaim application is a multi-protocol instant messaging client.\n\nA buffer overflow bug was found in the way gaim escapes HTML. It is\npossible that a remote attacker could send a specially crafted message\nto a Gaim client, causing it to crash. The Common Vulnerabilities and\nExposures project (cve.mitre.org) has assigned the name CVE-2005-0965\nto this issue.\n\nA bug was found in several of gaim's IRC processing functions. These\nfunctions fail to properly remove various markup tags within an IRC\nmessage. It is possible that a remote attacker could send a specially\ncrafted message to a Gaim client connected to an IRC server, causing\nit to crash. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CVE-2005-0966 to this issue.\n\nA bug was found in gaim's Jabber message parser. It is possible for a\nremote Jabber user to send a specially crafted message to a Gaim\nclient, causing it to crash. The Common Vulnerabilities and Exposures\nproject (cve.mitre.org) has assigned the name CVE-2005-0967 to this\nissue.\n\nIn addition to these denial of service issues, multiple minor upstream\nbugfixes are included in this update.\n\nUsers of Gaim are advised to upgrade to this updated package which\ncontains Gaim version 1.2.1 and is not vulnerable to these issues.", "edition": 29, "published": "2005-04-12T00:00:00", "title": "RHEL 3 / 4 : gaim (RHSA-2005:365)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-0966", "CVE-2005-0965", "CVE-2005-0967"], "modified": "2005-04-12T00:00:00", "cpe": ["cpe:/o:redhat:enterprise_linux:3", "cpe:/o:redhat:enterprise_linux:4", "p-cpe:/a:redhat:enterprise_linux:gaim"], "id": "REDHAT-RHSA-2005-365.NASL", "href": "https://www.tenable.com/plugins/nessus/18019", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2005:365. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(18019);\n script_version(\"1.27\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2005-0965\", \"CVE-2005-0966\", \"CVE-2005-0967\");\n script_xref(name:\"RHSA\", value:\"2005:365\");\n\n script_name(english:\"RHEL 3 / 4 : gaim (RHSA-2005:365)\");\n script_summary(english:\"Checks the rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An updated gaim package that fixes multiple denial of service issues\nis now available.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe Gaim application is a multi-protocol instant messaging client.\n\nA buffer overflow bug was found in the way gaim escapes HTML. It is\npossible that a remote attacker could send a specially crafted message\nto a Gaim client, causing it to crash. The Common Vulnerabilities and\nExposures project (cve.mitre.org) has assigned the name CVE-2005-0965\nto this issue.\n\nA bug was found in several of gaim's IRC processing functions. These\nfunctions fail to properly remove various markup tags within an IRC\nmessage. It is possible that a remote attacker could send a specially\ncrafted message to a Gaim client connected to an IRC server, causing\nit to crash. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CVE-2005-0966 to this issue.\n\nA bug was found in gaim's Jabber message parser. It is possible for a\nremote Jabber user to send a specially crafted message to a Gaim\nclient, causing it to crash. The Common Vulnerabilities and Exposures\nproject (cve.mitre.org) has assigned the name CVE-2005-0967 to this\nissue.\n\nIn addition to these denial of service issues, multiple minor upstream\nbugfixes are included in this update.\n\nUsers of Gaim are advised to upgrade to this updated package which\ncontains Gaim version 1.2.1 and is not vulnerable to these issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-0965\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-0966\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-0967\"\n );\n # http://www.securityfocus.com/archive/1/394806/2005-04-01/2005-04-07/0\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.securityfocus.com/archive/1/394806/2005-04-01/2005-04-07/0\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2005:365\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected gaim package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gaim\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:3\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2005/05/02\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/04/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/04/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(3|4)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 3.x / 4.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2005:365\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL3\", reference:\"gaim-1.2.1-4.el3\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", reference:\"gaim-1.2.1-4.el4\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gaim\");\n }\n}\n", "cvss": {"score": 6.4, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:P"}}, {"lastseen": "2021-01-20T15:22:11", "description": "Marco Alvarez found a Denial of Service vulnerability in the Jabber\nprotocol handler. A remote attacker could exploit this to crash Gaim\nby sending specially crafted file transfers to the user.\n(CAN-2005-0967)\n\nStu Tomlinson discovered an insufficient bounds checking flaw in the\nURL parser. By sending a message containing a very long URL, a remote\nattacker could crash Gaim or execute arbitrary code with the\nprivileges of the user. This was not possible on all protocols, due to\nmessage length restrictions. Jabber are SILC were known to be\nvulnerable. (CAN-2005-1261)\n\nSiebe Tolsma discovered a Denial of Service attack in the MSN handler.\nBy sending a specially crafted SLP message with an empty body, a\nremote attacker could crash Gaim. (CAN-2005-1262).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 24, "published": "2006-01-15T00:00:00", "title": "Ubuntu 4.10 / 5.04 : gaim vulnerabilities (USN-125-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-0967", "CVE-2005-1262", "CVE-2005-1261"], "modified": "2006-01-15T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:gaim-dev", "p-cpe:/a:canonical:ubuntu_linux:gaim-data", "cpe:/o:canonical:ubuntu_linux:5.04", "cpe:/o:canonical:ubuntu_linux:4.10", "p-cpe:/a:canonical:ubuntu_linux:gaim"], "id": "UBUNTU_USN-125-1.NASL", "href": "https://www.tenable.com/plugins/nessus/20515", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-125-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(20515);\n script_version(\"1.15\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2005-0967\", \"CVE-2005-1261\", \"CVE-2005-1262\");\n script_xref(name:\"USN\", value:\"125-1\");\n\n script_name(english:\"Ubuntu 4.10 / 5.04 : gaim vulnerabilities (USN-125-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Marco Alvarez found a Denial of Service vulnerability in the Jabber\nprotocol handler. A remote attacker could exploit this to crash Gaim\nby sending specially crafted file transfers to the user.\n(CAN-2005-0967)\n\nStu Tomlinson discovered an insufficient bounds checking flaw in the\nURL parser. By sending a message containing a very long URL, a remote\nattacker could crash Gaim or execute arbitrary code with the\nprivileges of the user. This was not possible on all protocols, due to\nmessage length restrictions. Jabber are SILC were known to be\nvulnerable. (CAN-2005-1261)\n\nSiebe Tolsma discovered a Denial of Service attack in the MSN handler.\nBy sending a specially crafted SLP message with an empty body, a\nremote attacker could crash Gaim. (CAN-2005-1262).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected gaim, gaim-data and / or gaim-dev packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:gaim\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:gaim-data\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:gaim-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:4.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:5.04\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/05/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/01/15\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2005-2019 Canonical, Inc. / NASL script (C) 2006-2016 Tenable Network Security, Inc.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! ereg(pattern:\"^(4\\.10|5\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 4.10 / 5.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"4.10\", pkgname:\"gaim\", pkgver:\"1.0.0-1ubuntu1.4\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"gaim\", pkgver:\"1.1.4-1ubuntu4.1\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"gaim-data\", pkgver:\"1.1.4-1ubuntu4.1\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"gaim-dev\", pkgver:\"1.1.4-1ubuntu4.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gaim / gaim-data / gaim-dev\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-06T09:24:48", "description": "An updated gaim package that fixes multiple denial of service issues\nis now available.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe Gaim application is a multi-protocol instant messaging client.\n\nA buffer overflow bug was found in the way gaim escapes HTML. It is\npossible that a remote attacker could send a specially crafted message\nto a Gaim client, causing it to crash. The Common Vulnerabilities and\nExposures project (cve.mitre.org) has assigned the name CVE-2005-0965\nto this issue.\n\nA bug was found in several of gaim's IRC processing functions. These\nfunctions fail to properly remove various markup tags within an IRC\nmessage. It is possible that a remote attacker could send a specially\ncrafted message to a Gaim client connected to an IRC server, causing\nit to crash. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CVE-2005-0966 to this issue.\n\nA bug was found in gaim's Jabber message parser. It is possible for a\nremote Jabber user to send a specially crafted message to a Gaim\nclient, causing it to crash. The Common Vulnerabilities and Exposures\nproject (cve.mitre.org) has assigned the name CVE-2005-0967 to this\nissue.\n\nIn addition to these denial of service issues, multiple minor upstream\nbugfixes are included in this update.\n\nUsers of Gaim are advised to upgrade to this updated package which\ncontains Gaim version 1.2.1 and is not vulnerable to these issues.", "edition": 27, "published": "2006-07-03T00:00:00", "title": "CentOS 3 / 4 : gaim (CESA-2005:365)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-0966", "CVE-2005-0965", "CVE-2005-0967"], "modified": "2006-07-03T00:00:00", "cpe": ["cpe:/o:centos:centos:4", "p-cpe:/a:centos:centos:gaim", "cpe:/o:centos:centos:3"], "id": "CENTOS_RHSA-2005-365.NASL", "href": "https://www.tenable.com/plugins/nessus/21811", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2005:365 and \n# CentOS Errata and Security Advisory 2005:365 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(21811);\n script_version(\"1.22\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2005-0965\", \"CVE-2005-0966\", \"CVE-2005-0967\");\n script_xref(name:\"RHSA\", value:\"2005:365\");\n\n script_name(english:\"CentOS 3 / 4 : gaim (CESA-2005:365)\");\n script_summary(english:\"Checks rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An updated gaim package that fixes multiple denial of service issues\nis now available.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe Gaim application is a multi-protocol instant messaging client.\n\nA buffer overflow bug was found in the way gaim escapes HTML. It is\npossible that a remote attacker could send a specially crafted message\nto a Gaim client, causing it to crash. The Common Vulnerabilities and\nExposures project (cve.mitre.org) has assigned the name CVE-2005-0965\nto this issue.\n\nA bug was found in several of gaim's IRC processing functions. These\nfunctions fail to properly remove various markup tags within an IRC\nmessage. It is possible that a remote attacker could send a specially\ncrafted message to a Gaim client connected to an IRC server, causing\nit to crash. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CVE-2005-0966 to this issue.\n\nA bug was found in gaim's Jabber message parser. It is possible for a\nremote Jabber user to send a specially crafted message to a Gaim\nclient, causing it to crash. The Common Vulnerabilities and Exposures\nproject (cve.mitre.org) has assigned the name CVE-2005-0967 to this\nissue.\n\nIn addition to these denial of service issues, multiple minor upstream\nbugfixes are included in this update.\n\nUsers of Gaim are advised to upgrade to this updated package which\ncontains Gaim version 1.2.1 and is not vulnerable to these issues.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2005-April/011557.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?9eceaa6b\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2005-April/011558.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?94531aea\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2005-April/011559.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c5aa8cb7\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2005-April/011562.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?d18e263a\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2005-April/011563.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?75945be1\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected gaim package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:gaim\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:3\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2005/05/02\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/04/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/07/03\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(3|4)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 3.x / 4.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-3\", reference:\"gaim-1.2.1-4.el3\")) flag++;\n\nif (rpm_check(release:\"CentOS-4\", reference:\"gaim-1.2.1-4.el4\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gaim\");\n}\n", "cvss": {"score": 6.4, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:P"}}], "freebsd": [{"lastseen": "2019-05-29T18:35:00", "bulletinFamily": "unix", "cvelist": ["CVE-2005-0967"], "description": "\nThe GAIM team reports:\n\nA remote jabber user can cause Gaim to crash by sending a\n\t specific file transfer request.\n\n", "edition": 4, "modified": "2005-04-04T00:00:00", "published": "2005-04-04T00:00:00", "id": "ECF68408-A9F5-11D9-A788-0001020EED82", "href": "https://vuxml.freebsd.org/freebsd/ecf68408-a9f5-11d9-a788-0001020eed82.html", "title": "gaim -- jabber remote crash", "type": "freebsd", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "ubuntu": [{"lastseen": "2020-07-18T01:39:07", "bulletinFamily": "unix", "cvelist": ["CVE-2005-0967", "CVE-2005-1262", "CVE-2005-1261"], "description": "Marco Alvarez found a Denial of Service vulnerability in the Jabber \nprotocol handler. A remote attacker could exploit this to crash Gaim \nby sending specially crafted file transfers to the user. \n(CAN-2005-0967)\n\nStu Tomlinson discovered an insufficient bounds checking flaw in the \nURL parser. By sending a message containing a very long URL, a remote \nattacker could crash Gaim or execute arbitrary code with the \nprivileges of the user. This was not possible on all protocols, due to \nmessage length restrictions. Jabber are SILC were known to be \nvulnerable. (CAN-2005-1261)\n\nSiebe Tolsma discovered a Denial of Service attack in the MSN handler. \nBy sending a specially crafted SLP message with an empty body, a \nremote attacker could crash Gaim. (CAN-2005-1262)", "edition": 5, "modified": "2005-05-13T00:00:00", "published": "2005-05-13T00:00:00", "id": "USN-125-1", "href": "https://ubuntu.com/security/notices/USN-125-1", "title": "Gaim vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "gentoo": [{"lastseen": "2016-09-06T19:46:27", "bulletinFamily": "unix", "cvelist": ["CVE-2005-0966", "CVE-2005-0965", "CVE-2005-0967"], "edition": 1, "description": "### Background\n\nGaim is a full featured instant messaging client which handles a variety of instant messaging protocols. \n\n### Description\n\nMultiple vulnerabilities have been addressed in the latest release of Gaim: \n\n * A buffer overread in the gaim_markup_strip_html() function, which is used when logging conversations (CAN-2005-0965).\n * Markup tags are improperly escaped using Gaim's IRC plugin (CAN-2005-0966).\n * Sending a specially crafted file transfer request to a Gaim Jabber user can trigger a crash (CAN-2005-0967).\n\n### Impact\n\nAn attacker could possibly cause a Denial of Service by exploiting any of these vulnerabilities. \n\n### Workaround\n\nThere is no known workaround at this time. \n\n### Resolution\n\nAll Gaim users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=net-im/gaim-1.2.1\"", "modified": "2005-04-06T00:00:00", "published": "2005-04-06T00:00:00", "id": "GLSA-200504-05", "href": "https://security.gentoo.org/glsa/200504-05", "type": "gentoo", "title": "Gaim: Denial of Service issues", "cvss": {"score": 6.4, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}}], "openvas": [{"lastseen": "2017-07-24T12:50:20", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-0966", "CVE-2005-0965", "CVE-2005-0967"], "description": "The remote host is missing updates announced in\nadvisory GLSA 200504-05.", "modified": "2017-07-07T00:00:00", "published": "2008-09-24T00:00:00", "id": "OPENVAS:54907", "href": "http://plugins.openvas.org/nasl.php?oid=54907", "type": "openvas", "title": "Gentoo Security Advisory GLSA 200504-05 (Gaim)", "sourceData": "# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Gaim contains multiple vulnerabilities that can lead to a Denial of\nService.\";\ntag_solution = \"All Gaim users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=net-im/gaim-1.2.1'\n\nhttp://www.securityspace.com/smysecure/catid.html?in=GLSA%20200504-05\nhttp://bugs.gentoo.org/show_bug.cgi?id=87903\nhttp://gaim.sourceforge.net/security/\";\ntag_summary = \"The remote host is missing updates announced in\nadvisory GLSA 200504-05.\";\n\n \n\nif(description)\n{\n script_id(54907);\n script_version(\"$Revision: 6596 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 11:21:37 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)\");\n script_cve_id(\"CVE-2005-0967\", \"CVE-2005-0966\", \"CVE-2005-0965\");\n script_tag(name:\"cvss_base\", value:\"6.4\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:P/A:P\");\n script_name(\"Gentoo Security Advisory GLSA 200504-05 (Gaim)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = ispkgvuln(pkg:\"net-im/gaim\", unaffected: make_list(\"ge 1.2.1\"), vulnerable: make_list(\"lt 1.2.1\"))) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 6.4, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}}], "centos": [{"lastseen": "2020-07-17T03:28:12", "bulletinFamily": "unix", "cvelist": ["CVE-2005-0966", "CVE-2005-0965", "CVE-2005-0967"], "description": "**CentOS Errata and Security Advisory** CESA-2005:365\n\n\nThe Gaim application is a multi-protocol instant messaging client.\n\nA buffer overflow bug was found in the way gaim escapes HTML. It is\npossible that a remote attacker could send a specially crafted message to a\nGaim client, causing it to crash. The Common Vulnerabilities and Exposures\nproject (cve.mitre.org) has assigned the name CAN-2005-0965 to this issue.\n\nA bug was found in several of gaim's IRC processing functions. These\nfunctions fail to properly remove various markup tags within an IRC\nmessage. It is possible that a remote attacker could send a specially\ncrafted message to a Gaim client connected to an IRC server, causing it to\ncrash. The Common Vulnerabilities and Exposures project (cve.mitre.org) has\nassigned the name CAN-2005-0966 to this issue.\n\nA bug was found in gaim's Jabber message parser. It is possible for a\nremote Jabber user to send a specially crafted message to a Gaim client,\ncausing it to crash. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2005-0967 to this issue.\n\nIn addition to these denial of service issues, multiple minor upstream\nbugfixes are included in this update.\n\nUsers of Gaim are advised to upgrade to this updated package which contains\nGaim version 1.2.1 and is not vulnerable to these issues.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2005-April/023595.html\nhttp://lists.centos.org/pipermail/centos-announce/2005-April/023596.html\nhttp://lists.centos.org/pipermail/centos-announce/2005-April/023597.html\nhttp://lists.centos.org/pipermail/centos-announce/2005-April/023600.html\nhttp://lists.centos.org/pipermail/centos-announce/2005-April/023601.html\nhttp://lists.centos.org/pipermail/centos-announce/2005-April/023603.html\n\n**Affected packages:**\ngaim\n\n**Upstream details at:**\n\nhttps://rhn.redhat.com/errata/RHSA-2005-365.html", "edition": 5, "modified": "2005-04-12T19:05:29", "published": "2005-04-12T15:08:29", "href": "http://lists.centos.org/pipermail/centos-announce/2005-April/023595.html", "id": "CESA-2005:365", "title": "gaim security update", "type": "centos", "cvss": {"score": 6.4, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:P"}}], "redhat": [{"lastseen": "2019-08-13T18:46:48", "bulletinFamily": "unix", "cvelist": ["CVE-2005-0965", "CVE-2005-0966", "CVE-2005-0967"], "description": "The Gaim application is a multi-protocol instant messaging client.\n\nA buffer overflow bug was found in the way gaim escapes HTML. It is\npossible that a remote attacker could send a specially crafted message to a\nGaim client, causing it to crash. The Common Vulnerabilities and Exposures\nproject (cve.mitre.org) has assigned the name CAN-2005-0965 to this issue.\n\nA bug was found in several of gaim's IRC processing functions. These\nfunctions fail to properly remove various markup tags within an IRC\nmessage. It is possible that a remote attacker could send a specially\ncrafted message to a Gaim client connected to an IRC server, causing it to\ncrash. The Common Vulnerabilities and Exposures project (cve.mitre.org) has\nassigned the name CAN-2005-0966 to this issue.\n\nA bug was found in gaim's Jabber message parser. It is possible for a\nremote Jabber user to send a specially crafted message to a Gaim client,\ncausing it to crash. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2005-0967 to this issue.\n\nIn addition to these denial of service issues, multiple minor upstream\nbugfixes are included in this update.\n\nUsers of Gaim are advised to upgrade to this updated package which contains\nGaim version 1.2.1 and is not vulnerable to these issues.", "modified": "2017-09-08T12:09:00", "published": "2005-04-12T04:00:00", "id": "RHSA-2005:365", "href": "https://access.redhat.com/errata/RHSA-2005:365", "type": "redhat", "title": "(RHSA-2005:365) gaim security update", "cvss": {"score": 6.4, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:P"}}], "suse": [{"lastseen": "2016-09-04T11:55:38", "bulletinFamily": "unix", "cvelist": ["CVE-2005-0208", "CVE-2005-1934", "CVE-2005-0473", "CVE-2005-0966", "CVE-2005-1409", "CVE-2005-0245", "CVE-2005-0246", "CVE-2005-1269", "CVE-2005-0244", "CVE-2005-0472", "CVE-2005-0965", "CVE-2005-0967", "CVE-2005-0227", "CVE-2005-1262", "CVE-2005-1686", "CVE-2005-1993", "CVE-2005-1410", "CVE-2005-0247"], "description": "Sudo(8) allows the execution of commands as another user and gives the administrator more flexibility than su(1). A race condition in the pathname handling of sudo may allow a local user to execute arbitrary commands. To exploit this bug some conditions need to be fulfilled. The attacking user needs to be listed in the sudoers file, he is able to create symbolic links in the filesystem, and a ALL alias- command needs to follow the attackers entry.\n#### Solution\nIt is recommended to install the updated packages.", "edition": 1, "modified": "2005-06-24T12:44:43", "published": "2005-06-24T12:44:43", "id": "SUSE-SA:2005:036", "href": "http://lists.opensuse.org/opensuse-security-announce/2005-06/msg00024.html", "title": "race condition, arbitrary code execution in sudo", "type": "suse", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}]}