First published: Thu Sep 02 2004(Updated: )
Multiple buffer overflows in Gaim before 0.82 allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) Rich Text Format (RTF) messages, (2) a long hostname for the local system as obtained from DNS, or (3) a long URL that is not properly handled by the URL decoder.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rob Flynn Gaim | =0.71 | |
Rob Flynn Gaim | =0.10.3 | |
Rob Flynn Gaim | =0.61 | |
Rob Flynn Gaim | =0.53 | |
Rob Flynn Gaim | =0.73 | |
Rob Flynn Gaim | =0.60 | |
Rob Flynn Gaim | =0.69 | |
Rob Flynn Gaim | =0.52 | |
Rob Flynn Gaim | =0.72 | |
Rob Flynn Gaim | =0.65 | |
Rob Flynn Gaim | =0.59 | |
Rob Flynn Gaim | =0.62 | |
Rob Flynn Gaim | =0.74 | |
Rob Flynn Gaim | =0.51 | |
Rob Flynn Gaim | =0.56 | |
Rob Flynn Gaim | =0.54 | |
Rob Flynn Gaim | =0.55 | |
Rob Flynn Gaim | =0.68 | |
Rob Flynn Gaim | =0.67 | |
Rob Flynn Gaim | =0.10 | |
Rob Flynn Gaim | =0.59.1 | |
Rob Flynn Gaim | =0.70 | |
Rob Flynn Gaim | =0.50 | |
Rob Flynn Gaim | =0.66 | |
Rob Flynn Gaim | =0.63 | |
Rob Flynn Gaim | =0.64 | |
Rob Flynn Gaim | =0.58 | |
Rob Flynn Gaim | =0.75 | |
Rob Flynn Gaim | =0.57 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.