From c5a9b3a3766a1119042e607fe96a3f5503cafda3 Mon Sep 17 00:00:00 2001 From: "Simon L. B. Nielsen" Date: Sun, 10 Apr 2005 19:41:46 +0000 Subject: [PATCH] Document three GAIM vulnerabilities. --- security/vuxml/vuln.xml | 103 ++++++++++++++++++++++++++++++++++++++++ 1 file changed, 103 insertions(+) diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 2f41e14fa52c..318940a8f7af 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,109 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> + + gaim -- jabber remote crash + + + gaim + ja-gaim + ko-gaim + ru-gaim + 1.2.1 + + + + +

The GAIM team reports:

+
+

A remote jabber user can cause Gaim to crash by sending a + specific file transfer request.

+
+ +
+ + 13004 + CAN-2005-0967 + http://gaim.sourceforge.net/security/?id=15 + + + 2005-04-04 + 2005-04-10 + +
+ + + gaim -- remote DoS on receiving certain messages over IRC + + + gaim + ja-gaim + ko-gaim + ru-gaim + 1.2.1 + + + + +

The GAIM team reports:

+
+

The IRC protocol plugin in Gaim 1.2.0, and possibly + earlier versions, allows (1) remote attackers to inject + arbitrary Gaim markup via irc_msg_kick, irc_msg_mode, + irc_msg_part, irc_msg_quit, (2) remote attackers to inject + arbitrary Pango markup and pop up empty dialog boxes via + irc_msg_invite, or (3) malicious IRC servers to cause a + denial of service (application crash) by injecting certain + Pango markup into irc_msg_badmode, irc_msg_banned, + irc_msg_unknown, irc_msg_nochan functions.

+
+ +
+ + 13003 + CAN-2005-0966 + http://gaim.sourceforge.net/security/?id=14 + + + 2005-04-02 + 2005-04-10 + +
+ + + gaim -- remote DoS on receiving malformed HTML + + + gaim + ja-gaim + ko-gaim + ru-gaim + 1.2.1 + + + + +

The GAIM team reports:

+
+

The gaim_markup_strip_html function in Gaim 1.2.0, and + possibly earlier versions, allows remote attackers to + cause a denial of service (application crash) via a string + that contains malformed HTML, which causes an + out-of-bounds read.

+
+ +
+ + 12999 + CAN-2005-0965 + http://gaim.sourceforge.net/security/?id=13 + + + 2005-04-02 + 2005-04-10 + +
+ php -- readfile() DoS vulnerability