Several vulnerabilities in the handling of YMSG protocol, Oscar protocol, proxy handling, and Gaim utilities have been identified. Because of these issues, it may be possible for a remote attacker to gain unauthorized access to hosts using the vulnerable software.
Several vulnerabilities in the handling of YMSG protocol, Oscar protocol, proxy handling, and Gaim utilities have been identified. Because of these issues, it may be possible for a remote attacker to gain unauthorized access to hosts using the vulnerable software.