USN-85-1: Gaim vulnerabilities
Posted on: 02/25/2005 10:46 AM

Updated Gaim packages are available for Ubuntu Linux 4.10

Ubuntu Security Notice USN-85-1 February 25, 2005
gaim vulnerabilities
CAN-2005-0208, CAN-2005-0472, CAN-2005-0473

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)

The following packages are affected:


The problem can be corrected by upgrading the affected package to version 1:1.0.0-1ubuntu1.2. In general, a standard system upgrade is sufficient to effect the necessary changes.

Details follow:

The Gaim developers discovered that the HTML parser did not sufficiently validate its input. This allowed a remote attacker to crash the Gaim client by sending certain malformed HTML messages. (CAN-2005-0208, CAN-2005-0473)

Another lack of sufficient input validation was found in the "Oscar" protocol handler which is used for ICQ and AIM. By sending specially crafted packets, remote users could trigger an infinite loop in Gaim which caused Gaim to become unresponsive and hang. (CAN-2005-0472)

Source archives:
Size/MD5: 42432 088aa80f79950d5efa7f6afc29d2915e
Size/MD5: 853 66848ad2c5b6ef2c136e8419d9c84e72
Size/MD5: 6985979 7dde686aace751a49dce734fd0cb7ace

amd64 architecture (Athlon64, Opteron, EM64T Xeon)
Size/MD5: 3444018 f829005df6031fa36622e04bcb30968e

i386 architecture (x86 compatible Intel/AMD)
Size/MD5: 3354146 f85b4b98fc5bc04fe494a5303f225967

powerpc architecture (Apple Macintosh G3/G4/G5)
Size/MD5: 3417968 614a7816b433efb292944822479661b1

Printed from Linux Compatible (