Buffer overflow in the MSN protocol handler for gaim 0.79 to 1.0.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an “unexpected sequence of MSNSLP messages” that results in an unbounded copy operation that writes to the wrong buffer.
gaim.sourceforge.net/security/?id=9
www.gentoo.org/security/en/glsa/glsa-200410-23.xml
www.redhat.com/support/errata/RHSA-2004-604.html
bugzilla.fedora.us/show_bug.cgi?id=2188
exchange.xforce.ibmcloud.com/vulnerabilities/17786
exchange.xforce.ibmcloud.com/vulnerabilities/17787
exchange.xforce.ibmcloud.com/vulnerabilities/17790
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11790
www.ubuntu.com/usn/usn-8-1/