blob: a5200daa5b422cc0175b883f508f4f5dc44f34e3 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200701-20">
<title>Centericq: Remote buffer overflow in LiveJournal handling</title>
<synopsis>
Centericq does not properly handle communications with the LiveJournal
service, allowing for the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">centericq</product>
<announced>January 24, 2007</announced>
<revised>January 24, 2007: 01</revised>
<bug>160793</bug>
<access>remote</access>
<affected>
<package name="net-im/centericq" auto="yes" arch="*">
<vulnerable range="le">4.21.0-r2</vulnerable>
</package>
</affected>
<background>
<p>
Centericq is a text mode menu-driven and window-driven instant
messaging interface.
</p>
</background>
<description>
<p>
When interfacing with the LiveJournal service, Centericq does not
appropriately allocate memory for incoming data, in some cases creating
a buffer overflow.
</p>
</description>
<impact type="normal">
<p>
An attacker could entice a user to connect to an unofficial LiveJournal
server causing Centericq to read specially crafted data from the
server, which could lead to the execution of arbitrary code with the
rights of the user running Centericq.
</p>
</impact>
<workaround>
<p>
There is no known workaround at this time.
</p>
</workaround>
<resolution>
<p>
Currently, Centericq is unmaintained. As such, Centericq has been
masked in Portage until it is again maintained.
</p>
<code>
# emerge --ask --verbose --unmerge &quot;net-im/centericq&quot;</code>
</resolution>
<references>
<uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0160">CVE-2007-0160</uri>
</references>
<metadata tag="requester" timestamp="Sun, 14 Jan 2007 18:03:01 +0000">
falco
</metadata>
<metadata tag="bugReady" timestamp="Sun, 14 Jan 2007 21:54:11 +0000">
falco
</metadata>
<metadata tag="submitter" timestamp="Thu, 18 Jan 2007 02:19:00 +0000">
shellsage
</metadata>
</glsa>