Home page logo

fulldisclosure logo Full Disclosure mailing list archives

[USN-85-1] Gaim vulnerabilities
From: Martin Pitt <martin.pitt () canonical com>
Date: Fri, 25 Feb 2005 17:00:44 +0100

Ubuntu Security Notice USN-85-1           February 25, 2005
gaim vulnerabilities
CAN-2005-0208, CAN-2005-0472, CAN-2005-0473

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)

The following packages are affected:


The problem can be corrected by upgrading the affected package to
version 1:1.0.0-1ubuntu1.2.  In general, a standard system upgrade is
sufficient to effect the necessary changes.

Details follow:

The Gaim developers discovered that the HTML parser did not
sufficiently validate its input. This allowed a remote attacker to
crash the Gaim client by sending certain malformed HTML messages.
(CAN-2005-0208, CAN-2005-0473)

Another lack of sufficient input validation was found in the "Oscar"
protocol handler which is used for ICQ and AIM. By sending specially
crafted packets, remote users could trigger an infinite loop in Gaim
which caused Gaim to become unresponsive and hang. (CAN-2005-0472)

  Source archives:

      Size/MD5:    42432 088aa80f79950d5efa7f6afc29d2915e
      Size/MD5:      853 66848ad2c5b6ef2c136e8419d9c84e72
      Size/MD5:  6985979 7dde686aace751a49dce734fd0cb7ace

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

      Size/MD5:  3444018 f829005df6031fa36622e04bcb30968e

  i386 architecture (x86 compatible Intel/AMD)

      Size/MD5:  3354146 f85b4b98fc5bc04fe494a5303f225967

  powerpc architecture (Apple Macintosh G3/G4/G5)

      Size/MD5:  3417968 614a7816b433efb292944822479661b1

Attachment: signature.asc
Description: Digital signature

Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

  By Date           By Thread  

Current thread:
  • [USN-85-1] Gaim vulnerabilities Martin Pitt (Feb 25)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]