_______________________________________________________________________
Package : gaim
Date : June 25, 2009
Affected: Corporate 3.0
_______________________________________________________________________
Problem Description:
Multiple security vulnerabilities has been identified and fixed
in gaim:
Buffer overflow in the XMPP SOCKS5 bytestream server in Pidgin before
2.5.6 allows remote authenticated users to execute arbitrary code via
vectors involving an outbound XMPP file transfer. NOTE: some of these
details are obtained from third party information (CVE-2009-1373).
Multiple integer overflows in the msn_slplink_process_msg functions
in the MSN protocol handler in (1) libpurple/protocols/msn/slplink.c
and (2) libpurple/protocols/msnp9/slplink.c in Pidgin before 2.5.6
on 32-bit platforms allow remote attackers to execute arbitrary code
via a malformed SLP message with a crafted offset value, leading to
buffer overflows. NOTE: this issue exists because of an incomplete
fix for CVE-2008-2927 (CVE-2009-1376).
The updated packages have been patched to prevent this.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cg ... -2009-1373
http://cve.mitre.org/cgi-bin/cvename.cg ... -2009-1376
_______________________________________________________________________