A SQL injection flaw was found in the way the logger module of Gajim, a Jabber client written in PyGTK, performed sanitization of conversation messages, when retrieving list of days having log entries. A remote attacker could use a specially-crafted Jabber ID (JID), which once processed by the Gajim's get_last_conversation_lines() method could lead to arbitrary SQL statement execution. Upstream ticket: [1] https://trac.gajim.org/ticket/7034 Relevant patches: [2] https://trac.gajim.org/changeset/bfd5f94489d8 [3] https://trac.gajim.org/changeset/988e38ce0e0c Other references: [4] http://seclists.org/oss-sec/2012/q2/34
While this issue has been previously corrected in the versions of the gajim package, as shipped with Fedora release of 15, 16, 17, and as shipped with Fedora EPEL 6, it still affects the version of the gajim package, as shipped with Fedora EPEL 5. Please schedule an update.
Created gajim tracking bugs for this issue Affects: epel-5 [bug 833485]
gajim-0.12.5-1.el5.2 has been pushed to the Fedora EPEL 5 stable repository. If problems still persist, please make note of it in this bug report.