First published: Wed May 11 2005(Updated: )
Stack-based buffer overflow in the URL parsing function in Gaim before 1.3.0 allows remote attackers to execute arbitrary code via an instant message (IM) with a large URL.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gaim | =1.1.4 | |
Gaim | =1.0.2 | |
Gaim | =0.81 | |
Gaim | =0.71 | |
Gaim | =0.10.3 | |
Gaim | =0.79 | |
Gaim | =0.61 | |
Gaim | =0.82.1 | |
Gaim | =0.53 | |
Gaim | =0.73 | |
Gaim | =1.1.2 | |
Gaim | =0.60 | |
Gaim | =1.0.1 | |
Gaim | =0.69 | |
Gaim | =0.52 | |
Gaim | =1.1.0 | |
Gaim | =1.2.1 | |
Gaim | =0.72 | |
Gaim | =0.65 | |
Gaim | =0.59 | |
Gaim | =0.62 | |
Gaim | =0.78 | |
Gaim | =0.74 | |
Gaim | =0.76 | |
Gaim | =0.51 | |
Gaim | =0.56 | |
Gaim | =0.54 | |
Gaim | =1.1.3 | |
Gaim | =1.2.0 | |
Gaim | =1.0.3 | |
Gaim | =1.0.0 | |
Gaim | =0.55 | |
Gaim | =0.82 | |
Gaim | =0.68 | |
Gaim | =0.77 | |
Gaim | =0.80 | |
Gaim | =0.67 | |
Gaim | =0.10 | |
Gaim | =0.59.1 | |
Gaim | =1.1.1 | |
Gaim | =0.70 | |
Gaim | =0.50 | |
Gaim | =0.66 | |
Gaim | =0.63 | |
Gaim | =0.64 | |
Gaim | =0.58 | |
Gaim | =0.75 | |
Gaim | =0.57 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-1261 is considered a high severity vulnerability due to its potential to allow remote attackers to execute arbitrary code.
To fix CVE-2005-1261, users should upgrade to Gaim version 1.3.0 or later, which contains the necessary security patches.
CVE-2005-1261 affects multiple older versions of Gaim, including versions 0.10 to 1.2.1.
CVE-2005-1261 is a stack-based buffer overflow vulnerability that occurs in the URL parsing function of Gaim.
Continuing to use Gaim with CVE-2005-1261 is risky, as it exposes the application to potential remote code execution.