diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 3f5525e3b8cb..1a8620d08ee1 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,75 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> + + gaim -- MSN remote DoS vulnerability + + + gaim + ja-gaim + ko-gaim + ru-gaim + 1.3.0 + + + + +

The GAIM team reports:

+
+

Potential remote denial of service bug resulting from not + checking a pointer for non-NULL before passing it to + strncmp, which results in a crash. This can be triggered + by a remote client sending an SLP message with an empty + body.

+
+ +
+ + CAN-2005-1262 + http://gaim.sourceforge.net/security/index.php?id=17 + + + 2005-05-10 + 2005-05-14 + +
+ + + gaim -- remote crash on some protocols + + + gaim + ja-gaim + ko-gaim + ru-gaim + 1.3.0 + + + + +

The GAIM team reports that GAIM is vulnerable to a + denial-of-service vulnerability which can cause GAIM to + crash:

+
+

It is possible for a remote user to overflow a static + buffer by sending an IM containing a very large URL + (greater than 8192 bytes) to the Gaim user. This is not + possible on all protocols, due to message length + restrictions. Jabber are SILC are known to be + vulnerable.

+
+ +
+ + CAN-2005-1261 + http://gaim.sourceforge.net/security/index.php?id=16 + + + 2005-05-10 + 2005-05-14 + +
+ kernel -- information disclosure when using HTT