17 results (0.010 seconds)

CVSS: 9.8EPSS: 15%CPEs: 1EXPL: 1

16 Aug 2005 — Buffer overflow in the AIM and ICQ module in Gaim before 1.5.0 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an away message with a large number of AIM substitution strings, such as %t or %n. • https://www.exploit-db.com/exploits/26139 • CWE-131: Incorrect Calculation of Buffer Size •

CVSS: 7.5EPSS: 2%CPEs: 8EXPL: 0

26 Jul 2005 — Multiple "memory alignment errors" in libgadu, as used in ekg before 1.6rc2, Gaim before 1.5.0, and other packages, allows remote attackers to cause a denial of service (bus error) on certain architectures such as SPARC via an incoming message. Múltiples "errores de alineamiento de memoria" en libgadu, usado en ekg anterior a la 1.5rc2, Gaim anteriores a 1.5.0 y otros paquetes permite que atacantes remotos causen una denegación de servicio (error de bus) en ciertas arquitecturas, tales como SPACRC, mediante... • http://gaim.sourceforge.net/security/index.php?id=20 • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 3%CPEs: 50EXPL: 0

14 Jun 2005 — Gaim before 1.3.1 allows remote attackers to cause a denial of service (application crash) via a Yahoo! message with non-ASCII characters in a file name. • http://gaim.sourceforge.net/security/?id=18 •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 0

19 May 2005 — Gaim before 1.3.1 allows remote attackers to cause a denial of service (crash) via a malformed MSN message that leads to a memory allocation of a large size, possibly due to an integer signedness error. • http://security.gentoo.org/glsa/glsa-200506-11.xml •

CVSS: 9.8EPSS: 27%CPEs: 48EXPL: 1

11 May 2005 — Stack-based buffer overflow in the URL parsing function in Gaim before 1.3.0 allows remote attackers to execute arbitrary code via an instant message (IM) with a large URL. • https://www.exploit-db.com/exploits/999 •

CVSS: 7.5EPSS: 1%CPEs: 48EXPL: 0

11 May 2005 — Gaim 1.2.1 and earlier allows remote attackers to cause a denial of service (application crash) via a malformed MSN message. • http://gaim.sourceforge.net/security/index.php?id=17 •

CVSS: 7.5EPSS: 0%CPEs: 36EXPL: 0

31 Dec 2004 — Gaim before 0.82 allows remote servers to cause a denial of service (application crash) via a long HTTP Content-Length header, which causes Gaim to abort when attempting to allocate memory. • http://gaim.sourceforge.net/security/?id=6 •

CVSS: 10.0EPSS: 8%CPEs: 42EXPL: 0

21 Oct 2004 — Buffer overflow in the MSN protocol handler for gaim 0.79 to 1.0.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an "unexpected sequence of MSNSLP messages" that results in an unbounded copy operation that writes to the wrong buffer. • http://gaim.sourceforge.net/security/?id=9 •

CVSS: 9.8EPSS: 13%CPEs: 29EXPL: 0

02 Sep 2004 — Integer overflow in Gaim before 0.82 allows remote attackers to cause a denial of service and possibly execute arbitrary code via the size variable in Groupware server messages. Desbordamiento de enteros en Gaim anteriores a 0.82 permite a atacantes remotos ejecutar código arbitrario mediante una la varible de tamaño en mensajes de servidor Groupware. • http://gaim.sourceforge.net/security/?id=2 •

CVSS: 9.8EPSS: 11%CPEs: 29EXPL: 0

02 Sep 2004 — Multiple buffer overflows in Gaim before 0.82 allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) Rich Text Format (RTF) messages, (2) a long hostname for the local system as obtained from DNS, or (3) a long URL that is not properly handled by the URL decoder. Múltiples desbordamientos de búfer en Gaim anteriores a 0.82 permite a atacantes remotos causar una dengación de servicio y posiblemente ejecutar código de su elección mediante (1) mensajes en Formato de Tex... • http://gaim.sourceforge.net/security/?id=3 •