FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-04-29 10:45:39 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
b6612eee-df5f-11d9-b875-0001020eed82gaim -- MSN Remote DoS vulnerability

The GAIM team reports:

Remote attackers can cause a denial of service (crash) via a malformed MSN message that leads to a memory allocation of a large size, possibly due to an integer signedness error.


Discovery 2005-06-10
Entry 2005-06-17
gaim
ja-gaim
ko-gaim
ru-gaim
< 1.3.1

13932
CVE-2005-1934
http://gaim.sourceforge.net/security/index.php?id=19
6d1761d2-0b23-11da-bc08-0001020eed82gaim -- AIM/ICQ away message buffer overflow

The GAIM team reports:

A remote AIM or ICQ user can cause a buffer overflow in Gaim by setting an away message containing many AIM substitution strings (such as %t or %n).


Discovery 2005-08-09
Entry 2005-08-12
gaim
ja-gaim
ko-gaim
ru-gaim
< 1.4.0_1

CVE-2005-2103
http://gaim.sourceforge.net/security/?id=22
8b0e94cc-b5cd-11d9-a788-0001020eed82gaim -- AIM/ICQ remote denial of service vulnerability

The GAIM team reports that GAIM is vulnerable to a denial-of-service vulnerability which can cause GAIM to freeze:

Certain malformed SNAC packets sent by other AIM or ICQ users can trigger an infinite loop in Gaim when parsing the SNAC. The remote user would need a custom client, able to generate malformed SNACs.


Discovery 2005-02-17
Entry 2005-04-25
gaim
ja-gaim
ko-gaim
ru-gaim
< 1.1.3

CVE-2005-0472
http://gaim.sourceforge.net/security/index.php?id=10
142353df-b5cc-11d9-a788-0001020eed82gaim -- remote DoS on receiving malformed HTML

The GAIM team reports:

Receiving malformed HTML can result in an invalid memory access causing Gaim to crash.


Discovery 2005-02-17
Entry 2005-04-25
gaim
ja-gaim
ko-gaim
ru-gaim
< 1.1.4

CVE-2005-0208
CVE-2005-0473
http://gaim.sourceforge.net/security/index.php?id=11
http://gaim.sourceforge.net/security/index.php?id=12
1e6c4008-245f-11d9-b584-0050fc56d258gaim -- buffer overflow in MSN protocol support

Due to a buffer overflow in the MSN protocol support for gaim 0.79 to 1.0.1, it is possible for remote clients to do a denial-of-service attack on the application. This is caused by an unbounded copy operation, which writes to the wrong buffer.


Discovery 2004-10-19
Entry 2004-10-25
gaim
ja-gaim
ru-gaim
ge 0.79 le 1.0.1

gaim
gt 20030000

CVE-2004-0891
http://gaim.sourceforge.net/security/?id=9
889061af-c427-11d9-ac59-02061b08fc24gaim -- remote crash on some protocols

The GAIM team reports that GAIM is vulnerable to a denial-of-service vulnerability which can cause GAIM to crash:

It is possible for a remote user to overflow a static buffer by sending an IM containing a very large URL (greater than 8192 bytes) to the Gaim user. This is not possible on all protocols, due to message length restrictions. Jabber are SILC are known to be vulnerable.


Discovery 2005-05-10
Entry 2005-05-14
gaim
ja-gaim
ko-gaim
ru-gaim
< 1.3.0

CVE-2005-1261
http://gaim.sourceforge.net/security/index.php?id=16
09db2844-0b21-11da-bc08-0001020eed82gaim -- AIM/ICQ non-UTF-8 filename crash

The GAIM team reports:

A remote user could cause Gaim to crash on some systems by sending the Gaim user a file whose filename contains certain invalid characters. It is unknown what combination of systems are affected, but it is suspected that Windows users and systems with older versions of GTK+ are especially susceptible.


Discovery 2005-08-09
Entry 2005-08-12
gaim
ja-gaim
ko-gaim
ru-gaim
< 1.4.0_1

CVE-2005-2102
http://gaim.sourceforge.net/security/?id=21
ecf68408-a9f5-11d9-a788-0001020eed82gaim -- jabber remote crash

The GAIM team reports:

A remote jabber user can cause Gaim to crash by sending a specific file transfer request.


Discovery 2005-04-04
Entry 2005-04-10
gaim
ja-gaim
ko-gaim
ru-gaim
< 1.2.1

13004
CVE-2005-0967
http://gaim.sourceforge.net/security/?id=15
3fa2b372-a9f5-11d9-a788-0001020eed82gaim -- remote DoS on receiving malformed HTML

The GAIM team reports:

The gaim_markup_strip_html function in Gaim 1.2.0, and possibly earlier versions, allows remote attackers to cause a denial of service (application crash) via a string that contains malformed HTML, which causes an out-of-bounds read.


Discovery 2005-04-02
Entry 2005-04-10
gaim
ja-gaim
ko-gaim
ru-gaim
< 1.2.1

12999
CVE-2005-0965
http://gaim.sourceforge.net/security/?id=13
3b4a6982-0b24-11da-bc08-0001020eed82libgadu -- multiple vulnerabilities

Wojtek Kaniewski reports:

Multiple vulnerabilities have been found in libgadu, a library for handling Gadu-Gadu instant messaging protocol. It is a part of ekg, a Gadu-Gadu client, but is widely used in other clients. Also some of the user contributed scripts were found to behave in an insecure manner.

  • integer overflow in libgadu (CVE-2005-1852) that could be triggered by an incomming message and lead to application crash and/or remote code execution
  • insecure file creation (CVE-2005-1850) and shell command injection (CVE-2005-1851) in other user contributed scripts (discovered by Marcin Owsiany and Wojtek Kaniewski)
  • several signedness errors in libgadu that could be triggered by an incomming network data or an application passing invalid user input to the library
  • memory alignment errors in libgadu that could be triggered by an incomming message and lead to bus errors on architectures like SPARC
  • endianness errors in libgadu that could cause invalid behaviour of applications on big-endian architectures

Discovery 2005-07-21
Entry 2005-08-12
Modified 2005-10-23
gaim
ja-gaim
ko-gaim
ru-gaim
< 1.4.0_1

kdenetwork
gt 3.2.2 lt 3.4.2

pl-ekg
< 1.6r3,1

centericq
< 4.21.0_1

14345
CVE-2005-1850
CVE-2005-1851
CVE-2005-1852
CVE-2005-2369
CVE-2005-2370
CVE-2005-2448
http://marc.theaimsgroup.com/?l=bugtraq&m=112198499417250
http://gaim.sourceforge.net/security/?id=20
http://www.kde.org/info/security/advisory-20050721-1.txt
f2d6a5e1-26b9-11d9-9289-000c41e2cdadgaim -- MSN denial-of-service vulnerabilities

The Gaim team discovered denial-of-service vulnerabilities in the MSN protocol handler:

After accepting a file transfer request, Gaim will attempt to allocate a buffer of a size equal to the entire filesize, this allocation attempt will cause Gaim to crash if the size exceeds the amount of available memory.

Gaim allocates a buffer for the payload of each message received based on the size field in the header of the message. A malicious peer could specify an invalid size that exceeds the amount of available memory.


Discovery 2004-10-19
Entry 2004-10-25
gaim
ja-gaim
ko-gaim
ru-gaim
< 1.0.2

gaim
gt 20030000

http://gaim.sourceforge.net/security/?id=7
http://gaim.sourceforge.net/security/?id=8
2701611f-df5c-11d9-b875-0001020eed82gaim -- Yahoo! remote crash vulnerability

Jacopo Ottaviani reports that Gaim can be crashed by being offered files with names containing non-ASCII characters via the Yahoo! protocol.


Discovery 2005-06-10
Entry 2005-06-17
gaim
ja-gaim
ko-gaim
ru-gaim
< 1.3.1

13931
CVE-2005-1269
http://gaim.sourceforge.net/security/index.php?id=18
ad5e70bb-c429-11d9-ac59-02061b08fc24gaim -- MSN remote DoS vulnerability

The GAIM team reports:

Potential remote denial of service bug resulting from not checking a pointer for non-NULL before passing it to strncmp, which results in a crash. This can be triggered by a remote client sending an SLP message with an empty body.


Discovery 2005-05-10
Entry 2005-05-14
gaim
ja-gaim
ko-gaim
ru-gaim
< 1.3.0

CVE-2005-1262
http://gaim.sourceforge.net/security/index.php?id=17
ec09baa3-a9f5-11d9-a788-0001020eed82gaim -- remote DoS on receiving certain messages over IRC

The GAIM team reports:

The IRC protocol plugin in Gaim 1.2.0, and possibly earlier versions, allows (1) remote attackers to inject arbitrary Gaim markup via irc_msg_kick, irc_msg_mode, irc_msg_part, irc_msg_quit, (2) remote attackers to inject arbitrary Pango markup and pop up empty dialog boxes via irc_msg_invite, or (3) malicious IRC servers to cause a denial of service (application crash) by injecting certain Pango markup into irc_msg_badmode, irc_msg_banned, irc_msg_unknown, irc_msg_nochan functions.


Discovery 2005-04-02
Entry 2005-04-10
gaim
ja-gaim
ko-gaim
ru-gaim
< 1.2.1

13003
CVE-2005-0966
http://gaim.sourceforge.net/security/?id=14