Bug 126842 - CAN-2004-0500 Gaim MSN protocol vulnerabilities
CAN-2004-0500 Gaim MSN protocol vulnerabilities
Product: Red Hat Enterprise Linux 3
Classification: Red Hat
Component: gaim (Show other bugs)
All Linux
medium Severity medium
: ---
: ---
Assigned To: Daniel Reed
: Security
Depends On:
  Show dependency treegraph
Reported: 2004-06-28 06:06 EDT by Mark J. Cox (Product Security)
Modified: 2007-11-30 17:07 EST (History)
1 user (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2004-09-07 11:35:18 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)
Current proposed gaim patch (1.75 KB, patch)
2004-07-14 18:03 EDT, Josh Bressers
no flags Details | Diff

  None (edit)
Description Mark J. Cox (Product Security) 2004-06-28 06:06:52 EDT
SUSE reported two potential exploitable remote vulnerabilities
in the Gaim msn protocol.  These need investigation to discover if
they require a malicious server to be exploited, or if they can be
exploited by packets by a peer.

RHEL2.1 shipped with gaim-0.59.1 which doesn't appear to have either
of these flaws (protocol code is totally different).

Embargoed.  No date yet set.

        CAN-2004-0500 Affects: 3AS 3ES 3WS 3Desktop
        CAN-2004-0500 Affects: FC1
        CAN-2004-0500 Affects: FC2
Comment 3 Josh Bressers 2004-07-14 18:03:23 EDT
Created attachment 101920 [details]
Current proposed gaim patch
Comment 4 Josh Bressers 2004-07-16 13:30:26 EDT
This is going to be RHSA-2004:400
Comment 5 Mark J. Cox (Product Security) 2004-08-05 04:44:22 EDT
(public, removing embargo)
Comment 7 Josh Bressers 2004-09-07 11:35:18 EDT
An errata has been issued which should help the problem 
described in this bug report. This report is therefore being 
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files, 
please follow the link below. You may reopen this bug report 
if the solution does not work for you.


Note You need to log in before you can comment on or make changes to this bug.