First published: Tue Aug 16 2005(Updated: )
Buffer overflow in the AIM and ICQ module in Gaim before 1.5.0 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an away message with a large number of AIM substitution strings, such as %t or %n.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rob Flynn Gaim | =1.1.4 | |
Rob Flynn Gaim | =1.0.2 | |
Rob Flynn Gaim | =0.81 | |
Rob Flynn Gaim | =0.71 | |
Rob Flynn Gaim | =0.10.3 | |
Rob Flynn Gaim | =0.79 | |
Rob Flynn Gaim | =0.61 | |
Rob Flynn Gaim | =0.82.1 | |
Rob Flynn Gaim | =0.53 | |
Rob Flynn Gaim | =0.73 | |
Rob Flynn Gaim | =1.1.2 | |
Rob Flynn Gaim | =1.0 | |
Rob Flynn Gaim | =0.60 | |
Rob Flynn Gaim | =1.0.1 | |
Rob Flynn Gaim | =0.69 | |
Rob Flynn Gaim | =0.52 | |
Rob Flynn Gaim | =1.1.0 | |
Rob Flynn Gaim | =1.2.1 | |
Rob Flynn Gaim | =1.3.1 | |
Rob Flynn Gaim | =0.72 | |
Rob Flynn Gaim | =0.65 | |
Rob Flynn Gaim | =0.59 | |
Rob Flynn Gaim | =0.62 | |
Rob Flynn Gaim | =0.78 | |
Rob Flynn Gaim | =0.74 | |
Rob Flynn Gaim | =0.76 | |
Rob Flynn Gaim | =0.51 | |
Rob Flynn Gaim | =0.56 | |
Rob Flynn Gaim | =0.54 | |
Rob Flynn Gaim | =1.1.3 | |
Rob Flynn Gaim | =1.2.0 | |
Rob Flynn Gaim | =1.0.3 | |
Rob Flynn Gaim | =1.0.0 | |
Rob Flynn Gaim | =1.3.0 | |
Rob Flynn Gaim | =0.55 | |
Rob Flynn Gaim | =0.82 | |
Rob Flynn Gaim | =0.68 | |
Rob Flynn Gaim | =0.77 | |
Rob Flynn Gaim | =0.80 | |
Rob Flynn Gaim | =0.67 | |
Rob Flynn Gaim | =0.10 | |
Rob Flynn Gaim | =0.59.1 | |
Rob Flynn Gaim | =1.1.1 | |
Rob Flynn Gaim | =0.70 | |
Rob Flynn Gaim | =0.50 | |
Rob Flynn Gaim | =0.66 | |
Rob Flynn Gaim | =0.63 | |
Rob Flynn Gaim | =1.4.0 | |
Rob Flynn Gaim | =0.64 | |
Rob Flynn Gaim | =0.58 | |
Rob Flynn Gaim | =0.75 | |
Rob Flynn Gaim | =0.57 | |
Gaim Project Gaim | <1.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.