Gentoo Logo

Gaim: Remote execution of arbitrary code


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200508-06 / Gaim
Release Date August 15, 2005
Latest Revision August 15, 2005: 01
Impact high
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
net-im/gaim < 1.5.0 >= 1.5.0 All supported architectures

Related bugreports: #102000


Gaim is vulnerable to a buffer overflow which could lead to the execution of arbitrary code or to a Denial of Service.

2.  Impact Information


Gaim is a full featured instant messaging client which handles a variety of instant messaging protocols.


Brandon Perry discovered that Gaim is vulnerable to a heap-based buffer overflow when handling away messages (CAN-2005-2103). Furthermore, Daniel Atallah discovered a vulnerability in the handling of file transfers (CAN-2005-2102).


A remote attacker could create a specially crafted away message which, when viewed by the target user, could lead to the execution of arbitrary code. Also, an attacker could send a file with a non-UTF8 filename to a user, which would result in a Denial of Service.

3.  Resolution Information


There is no known workaround at this time.


All Gaim users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=net-im/gaim-1.5.0"

4.  References


Page updated August 15, 2005

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2014 Gentoo Foundation, Inc. Questions, Comments? Contact us.