Upstream information

CVE-2005-0966 at MITRE

Description

The IRC protocol plugin in Gaim 1.2.0, and possibly earlier versions, allows (1) remote attackers to inject arbitrary Gaim markup via irc_msg_kick, irc_msg_mode, irc_msg_part, irc_msg_quit, (2) remote attackers to inject arbitrary Pango markup and pop up empty dialog boxes via irc_msg_invite, or (3) malicious IRC servers to cause a denial of service (application crash) by injecting certain Pango markup into irc_msg_badmode, irc_msg_banned, irc_msg_unknown, irc_msg_nochan functions.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 6.4
Vector AV:N/AC:L/Au:N/C:N/I:P/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact Partial
Availability Impact Partial
SUSE Bugzilla entries: 66609, 90337 [RESOLVED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SuSE Linux 8.2 for IA32
  • gaim >= 0.59.8-80
SuSE Linux 9.0 for AMD64
SuSE Linux 9.0 for IA32
  • gaim >= 0.67-88
SUSE LINUX 9.1 for IA32
SUSE LINUX 9.1 for x86-64
  • gaim >= 0.75-79.8
SUSE LINUX 9.2
  • gaim >= 0.82.1-3.6
SUSE LINUX 9.3
  • gaim >= 1.1.4-4.4
Novell Linux Desktop 9 for x86
Novell Linux Desktop 9 for x86_64
  • gaim >= 1.0.3-2.6
Builds
YOU Patch Nr: 10251