First published: Mon Apr 04 2005(Updated: )
The gaim_markup_strip_html function in Gaim 1.2.0, and possibly earlier versions, allows remote attackers to cause a denial of service (application crash) via a string that contains malformed HTML, which causes an out-of-bounds read.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gaim | =1.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0965 has a severity rating that indicates it can lead to denial of service through application crashes.
To fix CVE-2005-0965, update Gaim to the latest version that addresses this vulnerability.
Gaim versions prior to 1.2.0, including 1.2.0 itself, are affected by CVE-2005-0965.
CVE-2005-0965 allows remote attackers to cause a denial of service by sending specially crafted malformed HTML.
A possible workaround for CVE-2005-0965 is to avoid the use of Gaim until an update is available.