summaryrefslogtreecommitdiff
blob: a5200daa5b422cc0175b883f508f4f5dc44f34e3 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">

<glsa id="200701-20">
  <title>Centericq: Remote buffer overflow in LiveJournal handling</title>
  <synopsis>
    Centericq does not properly handle communications with the LiveJournal
    service, allowing for the remote execution of arbitrary code.
  </synopsis>
  <product type="ebuild">centericq</product>
  <announced>January 24, 2007</announced>
  <revised>January 24, 2007: 01</revised>
  <bug>160793</bug>
  <access>remote</access>
  <affected>
    <package name="net-im/centericq" auto="yes" arch="*">
      <vulnerable range="le">4.21.0-r2</vulnerable>
    </package>
  </affected>
  <background>
    <p>
    Centericq is a text mode menu-driven and window-driven instant
    messaging interface.
    </p>
  </background>
  <description>
    <p>
    When interfacing with the LiveJournal service, Centericq does not
    appropriately allocate memory for incoming data, in some cases creating
    a buffer overflow.
    </p>
  </description>
  <impact type="normal">
    <p>
    An attacker could entice a user to connect to an unofficial LiveJournal
    server causing Centericq to read specially crafted data from the
    server, which could lead to the execution of arbitrary code with the
    rights of the user running Centericq.
    </p>
  </impact>
  <workaround>
    <p>
    There is no known workaround at this time.
    </p>
  </workaround>
  <resolution>
    <p>
    Currently, Centericq is unmaintained. As such, Centericq has been
    masked in Portage until it is again maintained.
    </p>
    <code>
    # emerge --ask --verbose --unmerge &quot;net-im/centericq&quot;</code>
  </resolution>
  <references>
    <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0160">CVE-2007-0160</uri>
  </references>
  <metadata tag="requester" timestamp="Sun, 14 Jan 2007 18:03:01 +0000">
    falco
  </metadata>
  <metadata tag="bugReady" timestamp="Sun, 14 Jan 2007 21:54:11 +0000">
    falco
  </metadata>
  <metadata tag="submitter" timestamp="Thu, 18 Jan 2007 02:19:00 +0000">
    shellsage
  </metadata>
</glsa>