Gaim: MSN protocol parsing function buffer overflow
Gentoo Linux Security Advisory
||GLSA 200408-12 / gaim
||August 12, 2004
||May 22, 2006: 03
All supported architectures
Gaim contains a remotely exploitable buffer overflow vulnerability in the
MSN-protocol parsing code that may allow remote execution of arbitrary
Gaim is a multi-protocol instant messaging client for Linux which
supports many instant messaging protocols.
Sebastian Krahmer of the SuSE Security Team has discovered a remotely
exploitable buffer overflow vulnerability in the code handling MSN
By sending a carefully-crafted message, an attacker may execute
arbitrary code with the permissions of the user running Gaim.
There is no known workaround at this time. All users are encouraged to
upgrade to the latest available version of Gaim.
All Gaim users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge sync
# emerge -pv ">=net-im/gaim-0.81-r1"
# emerge ">=net-im/gaim-0.81-r1"