First published: Sat Feb 19 2005(Updated: )
Gaim before 1.1.3 allows remote attackers to cause a denial of service (infinite loop) via malformed SNAC packets from (1) AIM or (2) ICQ.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gaim | =1.1.2 | |
Gaim | =1.0 | |
Gaim | =1.0.1 | |
Gaim | =1.1.1 | |
Red Hat Enterprise Linux | =4.0 | |
Red Hat Enterprise Linux | =4.0 | |
Mandrake Linux | =10.1 | |
Mandriva Linux Corporate Server | =3.0 | |
Mandriva Linux Corporate Server | =3.0 | |
Red Hat Enterprise Linux | =4.0 | |
Mandrake Linux | =10.0 | |
redhat enterprise Linux desktop | =4.0 | |
Mandrake Linux | =10.0 | |
Mandrake Linux | =10.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0472 has a severity rating that indicates it allows remote attackers to cause a denial of service.
To fix CVE-2005-0472, users should upgrade Gaim to version 1.1.3 or later.
CVE-2005-0472 affects Gaim versions 1.0, 1.0.1, 1.1.1, and 1.1.2.
CVE-2005-0472 is a denial of service vulnerability caused by malformed SNAC packets.
Remote attackers utilizing malformed SNAC packets from AIM or ICQ are the potential threat actors in CVE-2005-0472.