Gaim IRC Protocol Plug-in Markup Language Injection Vulnerability
BID:13003
Info
Gaim IRC Protocol Plug-in Markup Language Injection Vulnerability
| Bugtraq ID: | 13003 |
| Class: | Input Validation Error |
| CVE: |
CVE-2005-0966 |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 05 2005 12:00AM |
| Updated: | Feb 28 2007 09:26PM |
| Credit: | Discovery of this vulnerability is credited to Jean-Yves Lefort. |
| Vulnerable: |
Ubuntu Ubuntu Linux 4.1 ppc Ubuntu Ubuntu Linux 4.1 ia64 Ubuntu Ubuntu Linux 4.1 ia32 Slackware Linux 10.1 SGI ProPack 3.0 S.u.S.E. Linux Professional 9.3 x86_64 S.u.S.E. Linux Professional 9.3 S.u.S.E. Linux Professional 9.2 x86_64 S.u.S.E. Linux Professional 9.2 S.u.S.E. Linux Professional 9.1 x86_64 S.u.S.E. Linux Professional 9.1 S.u.S.E. Linux Professional 9.0 x86_64 S.u.S.E. Linux Professional 9.0 S.u.S.E. Linux Personal 9.3 x86_64 S.u.S.E. Linux Personal 9.3 S.u.S.E. Linux Personal 9.2 x86_64 S.u.S.E. Linux Personal 9.2 S.u.S.E. Linux Personal 9.1 x86_64 S.u.S.E. Linux Personal 9.1 S.u.S.E. Linux Personal 9.0 x86_64 S.u.S.E. Linux Personal 9.0 Rob Flynn Gaim 1.2 Rob Flynn Gaim 1.1.4 Rob Flynn Gaim 1.1.3 Rob Flynn Gaim 1.1.2 Rob Flynn Gaim 1.1.1 Rob Flynn Gaim 1.0.2 Rob Flynn Gaim 1.0.1 Rob Flynn Gaim 1.0 Redhat Linux 9.0 i386 Redhat Linux 7.3 i686 Redhat Linux 7.3 i386 Redhat Linux 7.3 Redhat Fedora Core3 Redhat Fedora Core2 Redhat Fedora Core1 Redhat Enterprise Linux WS 4 Redhat Enterprise Linux WS 3 Redhat Enterprise Linux ES 4 Redhat Enterprise Linux ES 3 Redhat Enterprise Linux AS 4 Redhat Enterprise Linux AS 3 Redhat Desktop 4.0 Redhat Desktop 3.0 Peachtree Linux release 1 |
| Not Vulnerable: |
Rob Flynn Gaim 1.2.1 |
Discussion
Gaim IRC Protocol Plug-in Markup Language Injection Vulnerability
Gaim IRC protocol plug-in is reported prone to an input-validation vulnerability. The issue is reported to occur because of a lack of sufficient sanitization performed on 'irc_msg' data.
A remote attacker may exploit this vulnerability to execute arbitrary Gaim and Pango Markup language in the context of the user that is running the affected software.
This vulnerability is reported to affect Gaim version 1.2.0 and previous versions.
Gaim IRC protocol plug-in is reported prone to an input-validation vulnerability. The issue is reported to occur because of a lack of sufficient sanitization performed on 'irc_msg' data.
A remote attacker may exploit this vulnerability to execute arbitrary Gaim and Pango Markup language in the context of the user that is running the affected software.
This vulnerability is reported to affect Gaim version 1.2.0 and previous versions.
Exploit / POC
Gaim IRC Protocol Plug-in Markup Language Injection Vulnerability
Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
Solution / Fix
Gaim IRC Protocol Plug-in Markup Language Injection Vulnerability
Solution:
Vendor upgrades are available. Please see the referenced advisories for more information.
Rob Flynn Gaim 1.0
Rob Flynn Gaim 1.0.1
Rob Flynn Gaim 1.0.2
Rob Flynn Gaim 1.1.1
Rob Flynn Gaim 1.1.2
Rob Flynn Gaim 1.1.3
Rob Flynn Gaim 1.1.4
Rob Flynn Gaim 1.2
Slackware Linux 10.1
Solution:
Vendor upgrades are available. Please see the referenced advisories for more information.
Rob Flynn Gaim 1.0
-
Rob Flynn Gaim 1.2.1
http://gaim.sourceforge.net/downloads.php -
Ubuntu gaim_1.0.0-1ubuntu1.3_amd64.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/g/gaim/gaim_1.0.0-1ubuntu1 .3_amd64.deb -
Ubuntu gaim_1.0.0-1ubuntu1.3_i386.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/g/gaim/gaim_1.0.0-1ubuntu1 .3_i386.deb -
Ubuntu gaim_1.0.0-1ubuntu1.3_powerpc.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/g/gaim/gaim_1.0.0-1ubuntu1 .3_powerpc.deb
Rob Flynn Gaim 1.0.1
-
Fedora gaim-1.2.1-1.fc3.i386.rpm
RedHat Fedora Core 3
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/ -
Fedora gaim-1.2.1-1.fc3.x86_64.rpm
RedHat Fedora Core 3
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/ -
Fedora gaim-debuginfo-1.2.1-1.fc3.i386.rpm
RedHat Fedora Core 3
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/ -
Fedora gaim-debuginfo-1.2.1-1.fc3.x86_64.rpm
RedHat Fedora Core 3
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/ -
Rob Flynn Gaim 1.2.1
http://gaim.sourceforge.net/downloads.php
Rob Flynn Gaim 1.0.2
-
Rob Flynn Gaim 1.2.1
http://gaim.sourceforge.net/downloads.php
Rob Flynn Gaim 1.1.1
-
Rob Flynn Gaim 1.2.1
http://gaim.sourceforge.net/downloads.php
Rob Flynn Gaim 1.1.2
-
Rob Flynn Gaim 1.2.1
http://gaim.sourceforge.net/downloads.php
Rob Flynn Gaim 1.1.3
-
Rob Flynn Gaim 1.2.1
http://gaim.sourceforge.net/downloads.php
Rob Flynn Gaim 1.1.4
-
Rob Flynn Gaim 1.2.1
http://gaim.sourceforge.net/downloads.php
Rob Flynn Gaim 1.2
-
Rob Flynn Gaim 1.2.1
http://gaim.sourceforge.net/downloads.php
Slackware Linux 10.1
-
Slackware gaim-1.3.0-i486-1.tgz
Slackware 10.1:
ftp://ftp.slackware.com/pub/slackware/slackware-10.1/patches/packages/ gaim-1.3.0-i486-1.tgz
References
Gaim IRC Protocol Plug-in Markup Language Injection Vulnerability
References:
References:
- Gaim website (Rob Flynn
) - Remote DoS on receiving certain messages over IRC (Rob Flynn)
- RHSA-2005:365-06 - gaim security update (RedHat)
- [PLSN-0002] - Multiple vulnerabilities in Gaim (Peachtree Linux Security Team
)