|Main Archive Page > Month Archives > full-disclosure-uk archives|
rPath Security Advisory: 2008-0246-1
rPath Linux 1
Exposure Level Classification:
Indirect User Deterministic Unauthorized Access Updated Versions:
rPath Issue Tracking System:
Previous versions of the gaim package are vulnerable to multiple attacks, the most serious of which may allow a remote attacker to exploit the MSN protocol handler and thus execute arbitrary code as the user running gaim.
Copyright 2008 rPath, Inc.
This file is distributed under the terms of the MIT License. A copy is available at http://www.rpath.com/permanent/mit-license.html