
CVE-2005-2103 – Gaim AIM/ICQ Protocols - Multiple Vulnerabilities
https://notcve.org/view.php?id=CVE-2005-2103
16 Aug 2005 — Buffer overflow in the AIM and ICQ module in Gaim before 1.5.0 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an away message with a large number of AIM substitution strings, such as %t or %n. • https://www.exploit-db.com/exploits/26139 • CWE-131: Incorrect Calculation of Buffer Size •

CVE-2005-2370
https://notcve.org/view.php?id=CVE-2005-2370
26 Jul 2005 — Multiple "memory alignment errors" in libgadu, as used in ekg before 1.6rc2, Gaim before 1.5.0, and other packages, allows remote attackers to cause a denial of service (bus error) on certain architectures such as SPARC via an incoming message. Múltiples "errores de alineamiento de memoria" en libgadu, usado en ekg anterior a la 1.5rc2, Gaim anteriores a 1.5.0 y otros paquetes permite que atacantes remotos causen una denegación de servicio (error de bus) en ciertas arquitecturas, tales como SPACRC, mediante... • http://gaim.sourceforge.net/security/index.php?id=20 • CWE-399: Resource Management Errors •

CVE-2005-1269
https://notcve.org/view.php?id=CVE-2005-1269
14 Jun 2005 — Gaim before 1.3.1 allows remote attackers to cause a denial of service (application crash) via a Yahoo! message with non-ASCII characters in a file name. • http://gaim.sourceforge.net/security/?id=18 •

CVE-2005-1934
https://notcve.org/view.php?id=CVE-2005-1934
19 May 2005 — Gaim before 1.3.1 allows remote attackers to cause a denial of service (crash) via a malformed MSN message that leads to a memory allocation of a large size, possibly due to an integer signedness error. • http://security.gentoo.org/glsa/glsa-200506-11.xml •

CVE-2005-1261 – Gaim 1.2.1 - URL Handling Remote Stack Overflow
https://notcve.org/view.php?id=CVE-2005-1261
11 May 2005 — Stack-based buffer overflow in the URL parsing function in Gaim before 1.3.0 allows remote attackers to execute arbitrary code via an instant message (IM) with a large URL. • https://www.exploit-db.com/exploits/999 •

CVE-2005-1262
https://notcve.org/view.php?id=CVE-2005-1262
11 May 2005 — Gaim 1.2.1 and earlier allows remote attackers to cause a denial of service (application crash) via a malformed MSN message. • http://gaim.sourceforge.net/security/index.php?id=17 •

CVE-2004-2589
https://notcve.org/view.php?id=CVE-2004-2589
31 Dec 2004 — Gaim before 0.82 allows remote servers to cause a denial of service (application crash) via a long HTTP Content-Length header, which causes Gaim to abort when attempting to allocate memory. • http://gaim.sourceforge.net/security/?id=6 •

CVE-2004-0891
https://notcve.org/view.php?id=CVE-2004-0891
21 Oct 2004 — Buffer overflow in the MSN protocol handler for gaim 0.79 to 1.0.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an "unexpected sequence of MSNSLP messages" that results in an unbounded copy operation that writes to the wrong buffer. • http://gaim.sourceforge.net/security/?id=9 •

CVE-2004-0784
https://notcve.org/view.php?id=CVE-2004-0784
02 Sep 2004 — The smiley theme functionality in Gaim before 0.82 allows remote attackers to execute arbitrary commands via shell metacharacters in the filename of the tar file that is dragged to the smiley selector. La funcionalidad de temas de iconos gestuales (smileys) de Gaim anteriores a 0.82 permite a atacantes remotos ejecutar comandos de su elección mediante metacaractéres de shell en el nombre del fichero o del fichero tar que es arrastrado al selector del icono. • http://gaim.sourceforge.net/security/?id=1 •

CVE-2004-0500
https://notcve.org/view.php?id=CVE-2004-0500
02 Sep 2004 — Buffer overflow in the MSN protocol plugins (1) object.c and (2) slp.c for Gaim before 0.82 allows remote attackers to cause a denial of service and possibly execute arbitrary code via MSNSLP protocol messages that are not properly handled in a strncpy call. Desbordamiento de búfer en los conectores de protocolo MSN (1) object.c y (2) slp.c en Gaim anteriores a 0.83 permite a atacantes remotos causar una denegación de servicio y posiblemente ejecutar código de su elección mediante mensajes de protocolo MSNS... • http://gaim.sourceforge.net/security/?id=0 •