Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 102000 - net-im/gaim: Buffer Overflow and Denial of Service
Summary: net-im/gaim: Buffer Overflow and Denial of Service
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High critical (vote)
Assignee: Gentoo Security
URL: http://secunia.com/advisories/16379/
Whiteboard: A1 [glsa] formula7
Keywords:
: 102133 (view as bug list)
Depends on:
Blocks:
 
Reported: 2005-08-10 09:08 UTC by Jean-François Brunette (RETIRED)
Modified: 2005-08-15 21:56 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Jean-François Brunette (RETIRED) gentoo-dev 2005-08-10 09:08:43 UTC
CVE reference: CAN-2005-2102
CAN-2005-2103
 
 
Description:
A vulnerability and a weakness have been reported in Gaim, which can be 
exploited by malicious people to cause a DoS (Denial of Service) or compromise 
a user's system.

1) An error in the handling of away messages can be exploited to cause a heap-
based buffer overflow by sending a specially crafted away message to a user 
logged into AIM or ICQ.

Successful exploitation allows execution of arbitrary code.

2) An error in the handling of file transfers can be exploited to crash the 
application by attempting to upload a file with a non-UTF8 filename to a user 
logged into AIM or ICQ. 

----------------------

All versions seem to be vulnerable.
Comment 1 Thierry Carrez (RETIRED) gentoo-dev 2005-08-10 10:22:41 UTC
Pulling in net-im herd so that they are ready whenever upstream is.
Comment 2 Don Seiler (RETIRED) gentoo-dev 2005-08-10 10:40:40 UTC
gaim-1.5.0 slated for release Thurs evening.
Comment 3 Sebastian 2005-08-11 09:33:14 UTC
*** Bug 102133 has been marked as a duplicate of this bug. ***
Comment 4 Robert Paskowitz (RETIRED) gentoo-dev 2005-08-11 21:23:41 UTC
1.5.0 is also fixing CAN-2005-2370:

Summary:A memory alignment bug in the Gadu-Gadu protocol plugin can result in a buffer overflow
Description: There was a memory alignment bug in the library Gaim uses to access the Gadu-Gadu 
network. This bug can not be exploited on x86 architectures. This bug was recently fixed in the libgadu 
library, but also needed to be fixed in Gaim because Gaim includes a copy of the libgadu library.
Comment 5 Don Seiler (RETIRED) gentoo-dev 2005-08-11 21:38:40 UTC
Memory alignment bug was fixed in 1.4.0-r2.

I currently don't have a viable gentoo desktop, thanks to some CPU/mobo frying.
 tester@gentoo.org is going to cover this for me.
Comment 6 Olivier Crete (RETIRED) gentoo-dev 2005-08-11 21:43:46 UTC
added gaim-1.5.0 and marked it stable for x86 & amd64
Comment 7 Stefan Cornelius (RETIRED) gentoo-dev 2005-08-11 21:51:18 UTC
Arches please test and mark gaim-1.5.0 stable, thanks
Comment 8 Jory A. Pratt 2005-08-11 22:12:06 UTC
Stable on PPC.
Comment 9 Markus Rothe (RETIRED) gentoo-dev 2005-08-12 00:37:36 UTC
stable on ppc64
Comment 10 Gustavo Zacarias (RETIRED) gentoo-dev 2005-08-12 07:07:36 UTC
sparc stable.
Comment 11 Fernando J. Pereda (RETIRED) gentoo-dev 2005-08-12 07:59:24 UTC
alpha stable
Comment 12 Aaron Walker (RETIRED) gentoo-dev 2005-08-12 09:02:29 UTC
stable on mips.
Comment 13 Thierry Carrez (RETIRED) gentoo-dev 2005-08-12 13:46:58 UTC
It still misses hppa.
Comment 14 Bryan Østergaard (RETIRED) gentoo-dev 2005-08-12 15:02:24 UTC
Stable on ia64.
Comment 15 Michael Hanselmann (hansmi) (RETIRED) gentoo-dev 2005-08-13 00:25:03 UTC
Stable on hppa.
Comment 16 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2005-08-14 22:32:58 UTC
GLSA 200508-06 
 
arm please remember to mark stable to benifit from the GLSA.