Several remote vulnerabilities have been discovered in centericq, a text-mode multi-protocol instant messenger client, which could allow remote attackers to execute arbitrary code due to insufficient bounds-testing. For the old stable distribution (sarge) these problems have been fixed in version 4.20.0-1sarge5. For the stable distribution (etch) these problems have been fixed in version 4.21.0-18etch1. We recommend that you upgrade your centericq package.
Several remote vulnerabilities have been discovered in centericq, a text-mode multi-protocol instant messenger client, which could allow remote attackers to execute arbitrary code due to insufficient bounds-testing.
For the old stable distribution (sarge) these problems have been fixed in version 4.20.0-1sarge5.
For the stable distribution (etch) these problems have been fixed in version 4.21.0-18etch4.
We recommend that you upgrade your centericq package.
MD5 checksums of the listed files are available in the original advisory.