CentOS Errata and Security Advisory CESA-2005:429
The Gaim application is a multi-protocol instant messaging client.
A stack based buffer overflow bug was found in the way gaim processes a message containing a URL. A remote attacker could send a carefully crafted message resulting in the execution of arbitrary code on a victim's machine. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-1261 to this issue.
A bug was found in the way gaim handles malformed MSN messages. A remote attacker could send a carefully crafted MSN message causing gaim to crash. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-1262 to this issue.
Users of Gaim are advised to upgrade to this updated package which contains backported patches and is not vulnerable to these issues.
Merged security bulletin from advisories: http://lists.centos.org/pipermail/centos-announce/2005-May/011639.html http://lists.centos.org/pipermail/centos-announce/2005-May/011640.html http://lists.centos.org/pipermail/centos-announce/2005-May/011641.html http://lists.centos.org/pipermail/centos-announce/2005-May/011647.html http://lists.centos.org/pipermail/centos-announce/2005-May/011652.html http://lists.centos.org/pipermail/centos-announce/2005-May/011653.html http://lists.centos.org/pipermail/centos-announce/2005-May/011658.html
Affected packages: gaim php
Upstream details at: https://rhn.redhat.com/errata/RHSA-2005-429.html