Summary
The remote host is missing an update to gaim
announced via advisory DSA 1610-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201610-1
Insight
It was discovered that gaim, an multi-protocol instant messaging client, was vulnerable to several integer overflows in its MSN protocol handlers.
These could allow a remote attacker to execute arbitrary code.
For the stable distribution (etch), this problem has been fixed in version 1:2.0.0+beta5-10etch1.
For the unstable distribution (sid), this package is not present.
We recommend that you upgrade your gaim package.
Severity
Classification
-
CVE CVE-2008-2927 -
CVSS Base Score: 6.8
AV:N/AC:M/Au:N/C:P/I:P/A:P
Related Vulnerabilities