First published: Mon Apr 04 2005(Updated: )
The IRC protocol plugin in Gaim 1.2.0, and possibly earlier versions, allows (1) remote attackers to inject arbitrary Gaim markup via irc_msg_kick, irc_msg_mode, irc_msg_part, irc_msg_quit, (2) remote attackers to inject arbitrary Pango markup and pop up empty dialog boxes via irc_msg_invite, or (3) malicious IRC servers to cause a denial of service (application crash) by injecting certain Pango markup into irc_msg_badmode, irc_msg_banned, irc_msg_unknown, irc_msg_nochan functions.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gaim | =1.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0966 is considered a high severity vulnerability due to the potential for remote code execution and denial of service.
To fix CVE-2005-0966, upgrade Gaim to version 1.2.1 or later which addresses the vulnerability.
CVE-2005-0966 allows remote attackers to inject arbitrary Gaim and Pango markup leading to various exploits.
CVE-2005-0966 affects Gaim version 1.2.0 and possibly earlier versions.
Mitigation strategies for CVE-2005-0966 include avoiding the use of affected versions and applying security updates promptly.