6.4
CVSSv2

CVE-2005-0966

Published: 02/05/2005 Updated: 19/10/2018
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P

Vulnerability Summary

The IRC protocol plugin in Gaim 1.2.0, and possibly earlier versions, allows (1) remote malicious users to inject arbitrary Gaim markup via irc_msg_kick, irc_msg_mode, irc_msg_part, irc_msg_quit, (2) remote malicious users to inject arbitrary Pango markup and pop up empty dialog boxes via irc_msg_invite, or (3) malicious IRC servers to cause a denial of service (application crash) by injecting certain Pango markup into irc_msg_badmode, irc_msg_banned, irc_msg_unknown, irc_msg_nochan functions.

Vulnerable Product Search on Vulmon Subscribe to Product

rob flynn gaim 1.2.0

Vendor Advisories

Synopsis gaim security update Type/Severity Security Advisory: Important Topic An updated gaim package that fixes multiple denial of service issues is nowavailableThis update has been rated as having important security impact by the RedHat Security Response Team Description The Gaim appli ...
Jean-Yves Lefort discovered a buffer overflow in the gaim_markup_strip_html() function This caused Gaim to crash when receiving certain malformed HTML messages (CAN-2005-0965) ...