First published: Wed Apr 06 2005(Updated: )
Gaim 1.2.0 allows remote attackers to cause a denial of service (application crash) via a malformed file transfer request to a Jabber user, which leads to an out-of-bounds read.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gaim | =1.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0967 is classified as a high severity vulnerability due to its ability to cause a denial of service by crashing the application.
To mitigate CVE-2005-0967, it is recommended to upgrade Gaim to a version later than 1.2.0 to ensure the vulnerability is patched.
CVE-2005-0967 can be exploited through a malformed file transfer request sent to a Jabber user.
CVE-2005-0967 specifically affects Gaim version 1.2.0.
CVE-2005-0967 does not lead to data exposure, but rather results in application crashes affecting availability.