exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 15149

Secunia Security Advisory 15149
Posted May 29, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for gaim. This fixes a weakness, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, debian
SHA-256 | 2225a4848f484ab07d1642606c17265d79201f8eb5cef002edc8a2b4266f6485

Secunia Security Advisory 15149

Change Mirror Download


----------------------------------------------------------------------

Want a new IT Security job?

Vacant positions at Secunia:
http://secunia.com/secunia_vacancies/

----------------------------------------------------------------------

TITLE:
Debian update for gaim

SECUNIA ADVISORY ID:
SA15149

VERIFY ADVISORY:
http://secunia.com/advisories/15149/

CRITICAL:
Not critical

IMPACT:
DoS

WHERE:
>From remote

OPERATING SYSTEM:
Debian GNU/Linux unstable alias sid
http://secunia.com/product/530/
Debian GNU/Linux 3.0
http://secunia.com/product/143/

DESCRIPTION:
Debian has issued an update for gaim. This fixes a weakness, which
can be exploited by malicious people to cause a DoS (Denial of
Service).

For more information:
SA14322

SOLUTION:
Apply updated packages.

-- Debian GNU/Linux 3.0 alias woody --

Source archives:

http://security.debian.org/pool/updates/main/g/gaim/gaim_0.58-2.5.dsc
Size/MD5 checksum: 681 e985a045131d5ad43c2192533d581d49
http://security.debian.org/pool/updates/main/g/gaim/gaim_0.58-2.5.diff.gz
Size/MD5 checksum: 23078 688d4d51bd00e863c4c911f539708f0d
http://security.debian.org/pool/updates/main/g/gaim/gaim_0.58.orig.tar.gz
Size/MD5 checksum: 1928057 644df289daeca5f9dd3983d65c8b2407

Alpha architecture:

http://security.debian.org/pool/updates/main/g/gaim/gaim_0.58-2.5_alpha.deb
Size/MD5 checksum: 480588 297fed5e44fab4f49c3c103159ee3dc4
http://security.debian.org/pool/updates/main/g/gaim/gaim-common_0.58-2.5_alpha.deb
Size/MD5 checksum: 674918 1a59dbf94b98f25c18eaeee28aab5910
http://security.debian.org/pool/updates/main/g/gaim/gaim-gnome_0.58-2.5_alpha.deb
Size/MD5 checksum: 501450 bbe7cdac070bed0937596df34052c555

ARM architecture:

http://security.debian.org/pool/updates/main/g/gaim/gaim_0.58-2.5_arm.deb
Size/MD5 checksum: 401938 1f9588d2015c20477f35f59de2e67190
http://security.debian.org/pool/updates/main/g/gaim/gaim-common_0.58-2.5_arm.deb
Size/MD5 checksum: 615258 6a1d88825004fb405881674236b5f34b
http://security.debian.org/pool/updates/main/g/gaim/gaim-gnome_0.58-2.5_arm.deb
Size/MD5 checksum: 422646 eab79e46b080475268510509635388b2

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/g/gaim/gaim_0.58-2.5_i386.deb
Size/MD5 checksum: 389530 e4b3815727835a3ab112fb109a328021
http://security.debian.org/pool/updates/main/g/gaim/gaim-common_0.58-2.5_i386.deb
Size/MD5 checksum: 605678 619283e7b98add8bf725beb71a3de75b
http://security.debian.org/pool/updates/main/g/gaim/gaim-gnome_0.58-2.5_i386.deb
Size/MD5 checksum: 409274 c81aa5abd01455d0b082c6503e5abb32

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/g/gaim/gaim_0.58-2.5_ia64.deb
Size/MD5 checksum: 557214 f57cd6a3c35d2d7042690e5584d3c49c
http://security.debian.org/pool/updates/main/g/gaim/gaim-common_0.58-2.5_ia64.deb
Size/MD5 checksum: 765410 33b7051caea6919c87519bc9c570ef69
http://security.debian.org/pool/updates/main/g/gaim/gaim-gnome_0.58-2.5_ia64.deb
Size/MD5 checksum: 570064 2a9d5dbdd9b1bc7470d3a7a12cf3b453

HP Precision architecture:

http://security.debian.org/pool/updates/main/g/gaim/gaim_0.58-2.5_hppa.deb
Size/MD5 checksum: 459698 74a1621f52f73e436aeffc82e1c528a5
http://security.debian.org/pool/updates/main/g/gaim/gaim-common_0.58-2.5_hppa.deb
Size/MD5 checksum: 691344 06a88c54e725114cb0818b50dce65fd5
http://security.debian.org/pool/updates/main/g/gaim/gaim-gnome_0.58-2.5_hppa.deb
Size/MD5 checksum: 481568 5aaf2370d855711ae2d2916c13831f0b

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/g/gaim/gaim_0.58-2.5_m68k.deb
Size/MD5 checksum: 370690 627841728dabb3c6e83e60c8001a0ac4
http://security.debian.org/pool/updates/main/g/gaim/gaim-common_0.58-2.5_m68k.deb
Size/MD5 checksum: 622818 e4205658f157914fc5cea27c7248a71d
http://security.debian.org/pool/updates/main/g/gaim/gaim-gnome_0.58-2.5_m68k.deb
Size/MD5 checksum: 392316 8ee4f81a43e8b9ae123adadba2eed04c

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/g/gaim/gaim_0.58-2.5_mips.deb
Size/MD5 checksum: 406618 354027157ccc8439f28f3d05198cce12
http://security.debian.org/pool/updates/main/g/gaim/gaim-common_0.58-2.5_mips.deb
Size/MD5 checksum: 615058 36c64cdcac52153d504eb7e246560510
http://security.debian.org/pool/updates/main/g/gaim/gaim-gnome_0.58-2.5_mips.deb
Size/MD5 checksum: 427314 7f59f09c347ed39a12fad8408c40fab3

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/g/gaim/gaim_0.58-2.5_mipsel.deb
Size/MD5 checksum: 397210 f690bab2d77b7f5bc5c207ab8799a7ae
http://security.debian.org/pool/updates/main/g/gaim/gaim-common_0.58-2.5_mipsel.deb
Size/MD5 checksum: 607548 a62777c3ba8590660821edb1f46947ee
http://security.debian.org/pool/updates/main/g/gaim/gaim-gnome_0.58-2.5_mipsel.deb
Size/MD5 checksum: 416922 31b725e25888062257b1d9a212450a0e

PowerPC architecture:

http://security.debian.org/pool/updates/main/g/gaim/gaim_0.58-2.5_powerpc.deb
Size/MD5 checksum: 413722 b499efefdd53e1e1f99c82fe4345d740
http://security.debian.org/pool/updates/main/g/gaim/gaim-common_0.58-2.5_powerpc.deb
Size/MD5 checksum: 643070 e6a50e343c77e80e72c26570e4086452
http://security.debian.org/pool/updates/main/g/gaim/gaim-gnome_0.58-2.5_powerpc.deb
Size/MD5 checksum: 434530 be29354736f00ed85d5aa36d0bb86330

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/g/gaim/gaim_0.58-2.5_s390.deb
Size/MD5 checksum: 399718 1328ff0fecf64d0a8db50bcbf6a4307d
http://security.debian.org/pool/updates/main/g/gaim/gaim-common_0.58-2.5_s390.deb
Size/MD5 checksum: 644284 c668b1de2ad8c707c5f8ad2de456bf9c
http://security.debian.org/pool/updates/main/g/gaim/gaim-gnome_0.58-2.5_s390.deb
Size/MD5 checksum: 422222 14e4654f7df7c22fb6e8240908c7836c

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/g/gaim/gaim_0.58-2.5_sparc.deb
Size/MD5 checksum: 409866 7d8a00f61567dea550246ba36ee8f350
http://security.debian.org/pool/updates/main/g/gaim/gaim-common_0.58-2.5_sparc.deb
Size/MD5 checksum: 654072 aca9f7da61fa3f05e5394844fd1cc0ba
http://security.debian.org/pool/updates/main/g/gaim/gaim-gnome_0.58-2.5_sparc.deb
Size/MD5 checksum: 428798 d4eb82d10dfcaee16df40d3c4547e809


-- Debian GNU/Linux unstable alias sid --

Fixed in version 1.1.3-1.

ORIGINAL ADVISORY:
http://www.debian.org/security/2005/dsa-716

OTHER REFERENCES:
SA14322:
http://secunia.com/advisories/14322/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close