summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorSimon L. B. Nielsen <simon@FreeBSD.org>2005-06-17 19:12:46 +0000
committerSimon L. B. Nielsen <simon@FreeBSD.org>2005-06-17 19:12:46 +0000
commit377794aabef29d6634ba0f262b507e4d0315ca22 (patch)
tree02f6dabdb08fa99b28bf20793338c02b4a575912
parentAdd marathon2-data 1.0, (diff)
Document two vulnerabilities in Gaim.
-rw-r--r--security/vuxml/vuln.xml62
1 files changed, 62 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 9a3e18923026..e46036532a08 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -32,6 +32,68 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="2701611f-df5c-11d9-b875-0001020eed82">
+ <topic>gaim -- Yahoo! remote crash vulnerability</topic>
+ <affects>
+ <package>
+ <name>gaim</name>
+ <name>ja-gaim</name>
+ <name>ko-gaim</name>
+ <name>ru-gaim</name>
+ <range><lt>1.3.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Jacopo Ottaviani reports that Gaim can be crashed by being
+ offered files with names containing non-ASCII
+ characters via the Yahoo! protocol.</p>
+ </body>
+ </description>
+ <references>
+ <bid>13931</bid>
+ <cvename>CAN-2005-1269</cvename>
+ <url>http://gaim.sourceforge.net/security/index.php?id=18</url>
+ </references>
+ <dates>
+ <discovery>2005-06-10</discovery>
+ <entry>2005-06-17</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="b6612eee-df5f-11d9-b875-0001020eed82">
+ <topic>gaim -- MSN Remote DoS vulnerability</topic>
+ <affects>
+ <package>
+ <name>gaim</name>
+ <name>ja-gaim</name>
+ <name>ko-gaim</name>
+ <name>ru-gaim</name>
+ <range><lt>1.3.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The GAIM team reports:</p>
+ <blockquote cite="http://gaim.sourceforge.net/security/index.php?id=19">
+ <p>Remote attackers can cause a denial of service (crash)
+ via a malformed MSN message that leads to a memory
+ allocation of a large size, possibly due to an integer
+ signedness error.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <bid>13932</bid>
+ <cvename>CAN-2005-1934</cvename>
+ <url>http://gaim.sourceforge.net/security/index.php?id=19</url>
+ </references>
+ <dates>
+ <discovery>2005-06-10</discovery>
+ <entry>2005-06-17</entry>
+ </dates>
+ </vuln>
+
<vuln vid="12b1a62d-6056-4d90-9e21-45fcde6abae4">
<topic>gallery -- remote code injection via HTTP_POST_VARS</topic>
<affects>