Debian Security Advisory DSA 1610-1 (gaim)

Summary
The remote host is missing an update to gaim announced via advisory DSA 1610-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201610-1
Insight
It was discovered that gaim, an multi-protocol instant messaging client, was vulnerable to several integer overflows in its MSN protocol handlers. These could allow a remote attacker to execute arbitrary code. For the stable distribution (etch), this problem has been fixed in version 1:2.0.0+beta5-10etch1. For the unstable distribution (sid), this package is not present. We recommend that you upgrade your gaim package.