blob: 6d8bdc8fb2b44a2dd7224ba738d25a53d543f84a [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200408-27">
<title>Gaim: New vulnerabilities</title>
Gaim contains several security issues that might allow an attacker to
execute arbitrary code or commands.
<product type="ebuild">Gaim</product>
<announced>August 27, 2004</announced>
<revised>May 22, 2006: 02</revised>
<package name="net-im/gaim" auto="yes" arch="*">
<unaffected range="ge">0.81-r5</unaffected>
<vulnerable range="lt">0.81-r5</vulnerable>
Gaim is a multi-protocol instant messaging client for Linux which
supports many instant messaging protocols.
Gaim fails to do proper bounds checking when:
<li>Handling MSN messages (partially fixed with GLSA 200408-12).</li>
<li>Handling rich text format messages.</li>
<li>Resolving local hostname.</li>
<li>Receiving long URLs.</li>
<li>Handling groupware messages.</li>
<li>Allocating memory for webpages with fake content-length
Furthermore Gaim fails to escape filenames when using drag and drop
installation of smiley themes.
<impact type="normal">
These vulnerabilities could allow an attacker to crash Gaim or execute
arbitrary code or commands with the permissions of the user running
There is no known workaround at this time. All users are encouraged to
upgrade to the latest available version of Gaim.
All gaim users should upgrade to the latest version:
# emerge sync
# emerge -pv &quot;&gt;=net-im/gaim-0.81-r5&quot;
# emerge &quot;&gt;=net-im/gaim-0.81-r5&quot;</code>
<uri link="">Gaim security issues</uri>
<uri link="">CVE-2004-0500</uri>
<uri link="">CVE-2004-0754</uri>
<uri link="">CVE-2004-0784</uri>
<uri link="">CVE-2004-0785</uri>
<metadata tag="requester" timestamp="Thu, 26 Aug 2004 15:30:26 +0000">
<metadata tag="submitter" timestamp="Thu, 26 Aug 2004 19:01:27 +0000">