Madrid, August 30 2004 - Versions prior to 0.82 of the Gaim instant messaging client are affected by several security problems(*) that could allow an attacker to execute arbitrary code and compromise system security.
Most of the vulnerabilities are related to buffer overflows and can be exploited from servers or other clients. Attackers who exploited these problems could cause effects ranging from denial of service (DoS), causing Gaim to stop working, to execution of arbitrary code, allowing them to take control of the affected computer.
These vulnerabilities have been corrected in version 0.82 of Gaim, which can be downloaded from: http
/gaim.sourceforge.net/downloads.php