
CVE-2005-2103 – Gaim AIM/ICQ Protocols - Multiple Vulnerabilities
https://notcve.org/view.php?id=CVE-2005-2103
16 Aug 2005 — Buffer overflow in the AIM and ICQ module in Gaim before 1.5.0 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an away message with a large number of AIM substitution strings, such as %t or %n. • https://www.exploit-db.com/exploits/26139 • CWE-131: Incorrect Calculation of Buffer Size •

CVE-2005-2370
https://notcve.org/view.php?id=CVE-2005-2370
26 Jul 2005 — Multiple "memory alignment errors" in libgadu, as used in ekg before 1.6rc2, Gaim before 1.5.0, and other packages, allows remote attackers to cause a denial of service (bus error) on certain architectures such as SPARC via an incoming message. Múltiples "errores de alineamiento de memoria" en libgadu, usado en ekg anterior a la 1.5rc2, Gaim anteriores a 1.5.0 y otros paquetes permite que atacantes remotos causen una denegación de servicio (error de bus) en ciertas arquitecturas, tales como SPACRC, mediante... • http://gaim.sourceforge.net/security/index.php?id=20 • CWE-399: Resource Management Errors •

CVE-2005-1269
https://notcve.org/view.php?id=CVE-2005-1269
14 Jun 2005 — Gaim before 1.3.1 allows remote attackers to cause a denial of service (application crash) via a Yahoo! message with non-ASCII characters in a file name. • http://gaim.sourceforge.net/security/?id=18 •

CVE-2005-1934
https://notcve.org/view.php?id=CVE-2005-1934
19 May 2005 — Gaim before 1.3.1 allows remote attackers to cause a denial of service (crash) via a malformed MSN message that leads to a memory allocation of a large size, possibly due to an integer signedness error. • http://security.gentoo.org/glsa/glsa-200506-11.xml •

CVE-2005-1261 – Gaim 1.2.1 - URL Handling Remote Stack Overflow
https://notcve.org/view.php?id=CVE-2005-1261
11 May 2005 — Stack-based buffer overflow in the URL parsing function in Gaim before 1.3.0 allows remote attackers to execute arbitrary code via an instant message (IM) with a large URL. • https://www.exploit-db.com/exploits/999 •

CVE-2005-1262
https://notcve.org/view.php?id=CVE-2005-1262
11 May 2005 — Gaim 1.2.1 and earlier allows remote attackers to cause a denial of service (application crash) via a malformed MSN message. • http://gaim.sourceforge.net/security/index.php?id=17 •

CVE-2004-2589
https://notcve.org/view.php?id=CVE-2004-2589
31 Dec 2004 — Gaim before 0.82 allows remote servers to cause a denial of service (application crash) via a long HTTP Content-Length header, which causes Gaim to abort when attempting to allocate memory. • http://gaim.sourceforge.net/security/?id=6 •

CVE-2004-0891
https://notcve.org/view.php?id=CVE-2004-0891
21 Oct 2004 — Buffer overflow in the MSN protocol handler for gaim 0.79 to 1.0.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an "unexpected sequence of MSNSLP messages" that results in an unbounded copy operation that writes to the wrong buffer. • http://gaim.sourceforge.net/security/?id=9 •

CVE-2004-0754
https://notcve.org/view.php?id=CVE-2004-0754
02 Sep 2004 — Integer overflow in Gaim before 0.82 allows remote attackers to cause a denial of service and possibly execute arbitrary code via the size variable in Groupware server messages. Desbordamiento de enteros en Gaim anteriores a 0.82 permite a atacantes remotos ejecutar código arbitrario mediante una la varible de tamaño en mensajes de servidor Groupware. • http://gaim.sourceforge.net/security/?id=2 •

CVE-2004-0500
https://notcve.org/view.php?id=CVE-2004-0500
02 Sep 2004 — Buffer overflow in the MSN protocol plugins (1) object.c and (2) slp.c for Gaim before 0.82 allows remote attackers to cause a denial of service and possibly execute arbitrary code via MSNSLP protocol messages that are not properly handled in a strncpy call. Desbordamiento de búfer en los conectores de protocolo MSN (1) object.c y (2) slp.c en Gaim anteriores a 0.83 permite a atacantes remotos causar una denegación de servicio y posiblemente ejecutar código de su elección mediante mensajes de protocolo MSNS... • http://gaim.sourceforge.net/security/?id=0 •