rPath Security Advisory: 2008-0246-1
rPath Linux 1
Exposure Level Classification:
Indirect User Deterministic Unauthorized Access
rPath Issue Tracking System:
Previous versions of the gaim package are vulnerable to multiple
attacks, the most serious of which may allow a remote attacker to
exploit the MSN protocol handler and thus execute arbitrary code
as the user running gaim.
Copyright 2008 rPath, Inc.
This file is distributed under the terms of the MIT License.
A copy is available at http://www.rpath.com/permanent/mit-license.html