«
Expand/Collapse
13 items tagged "oscar"
Related tags:
red hat security [+],
red [+],
pidgin [+],
aim instant messaging [+],
protocol [+],
hacks [+],
presence protocol [+],
flaw [+],
channel messages [+],
sim im [+],
plugin [+],
msn protocol [+],
msn [+],
mandriva linux [+],
directory traversal vulnerability [+],
android [+],
whims [+],
veterinary surgeon [+],
trash [+],
system [+],
sketch [+],
security [+],
scientist [+],
robot drives [+],
robot [+],
prosthetic feet [+],
props [+],
processing [+],
noel fitzpatrick [+],
modem [+],
medical [+],
mad scientist [+],
home [+],
harvester [+],
hardware choices [+],
hangout [+],
halloween props [+],
halloween [+],
gus [+],
google [+],
ghoulish [+],
external modem [+],
external crystal [+],
cat [+],
bob [+],
bluetooth devices [+],
bluetooth communications [+],
bluetooth [+],
bejesus [+],
alarm [+],
accident [+]
-
-
12:00
»
Hack a Day
[Gus] made it to the Google+ developers vlog to show off his new Google+ hangout controlled robot. This robot, named OSCAR (Overly Simplified Collaboratively Actuated Robot), drives around according to the whims of everyone in a Google+ hangout. Not only is the robot under remote control through a Google+ hangout, it also features a camera, allowing a [...]
-
-
16:57
»
Packet Storm Security Advisories
Red Hat Security Advisory 2011-1821-01 - Pidgin is an instant messaging program which can log in to multiple accounts on multiple instant messaging networks simultaneously. An input sanitization flaw was found in the way the AOL Open System for Communication in Realtime protocol plug-in in Pidgin, used by the AOL ICQ and AIM instant messaging systems, escaped certain UTF-8 characters. A remote attacker could use this flaw to crash Pidgin via a specially-crafted OSCAR message. Multiple NULL pointer dereference flaws were found in the Jingle extension of the Extensible Messaging and Presence Protocol protocol plug-in in Pidgin. A remote attacker could use these flaws to crash Pidgin via a specially-crafted Jingle multimedia message.
-
16:57
»
Packet Storm Security Recent Files
Red Hat Security Advisory 2011-1821-01 - Pidgin is an instant messaging program which can log in to multiple accounts on multiple instant messaging networks simultaneously. An input sanitization flaw was found in the way the AOL Open System for Communication in Realtime protocol plug-in in Pidgin, used by the AOL ICQ and AIM instant messaging systems, escaped certain UTF-8 characters. A remote attacker could use this flaw to crash Pidgin via a specially-crafted OSCAR message. Multiple NULL pointer dereference flaws were found in the Jingle extension of the Extensible Messaging and Presence Protocol protocol plug-in in Pidgin. A remote attacker could use these flaws to crash Pidgin via a specially-crafted Jingle multimedia message.
-
16:57
»
Packet Storm Security Misc. Files
Red Hat Security Advisory 2011-1821-01 - Pidgin is an instant messaging program which can log in to multiple accounts on multiple instant messaging networks simultaneously. An input sanitization flaw was found in the way the AOL Open System for Communication in Realtime protocol plug-in in Pidgin, used by the AOL ICQ and AIM instant messaging systems, escaped certain UTF-8 characters. A remote attacker could use this flaw to crash Pidgin via a specially-crafted OSCAR message. Multiple NULL pointer dereference flaws were found in the Jingle extension of the Extensible Messaging and Presence Protocol protocol plug-in in Pidgin. A remote attacker could use these flaws to crash Pidgin via a specially-crafted Jingle multimedia message.
-
16:46
»
Packet Storm Security Advisories
Red Hat Security Advisory 2011-1820-01 - Pidgin is an instant messaging program which can log in to multiple accounts on multiple instant messaging networks simultaneously. An input sanitization flaw was found in the way the AOL Open System for Communication in Realtime protocol plug-in in Pidgin, used by the AOL ICQ and AIM instant messaging systems, escaped certain UTF-8 characters. A remote attacker could use this flaw to crash Pidgin via a specially-crafted OSCAR message. An input sanitization flaw was found in the way the Pidgin SILC protocol plug-in escaped certain UTF-8 characters in channel messages. A remote attacker could use this flaw to crash Pidgin via a specially-crafted SILC message.
-
16:46
»
Packet Storm Security Recent Files
Red Hat Security Advisory 2011-1820-01 - Pidgin is an instant messaging program which can log in to multiple accounts on multiple instant messaging networks simultaneously. An input sanitization flaw was found in the way the AOL Open System for Communication in Realtime protocol plug-in in Pidgin, used by the AOL ICQ and AIM instant messaging systems, escaped certain UTF-8 characters. A remote attacker could use this flaw to crash Pidgin via a specially-crafted OSCAR message. An input sanitization flaw was found in the way the Pidgin SILC protocol plug-in escaped certain UTF-8 characters in channel messages. A remote attacker could use this flaw to crash Pidgin via a specially-crafted SILC message.
-
16:46
»
Packet Storm Security Misc. Files
Red Hat Security Advisory 2011-1820-01 - Pidgin is an instant messaging program which can log in to multiple accounts on multiple instant messaging networks simultaneously. An input sanitization flaw was found in the way the AOL Open System for Communication in Realtime protocol plug-in in Pidgin, used by the AOL ICQ and AIM instant messaging systems, escaped certain UTF-8 characters. A remote attacker could use this flaw to crash Pidgin via a specially-crafted OSCAR message. An input sanitization flaw was found in the way the Pidgin SILC protocol plug-in escaped certain UTF-8 characters in channel messages. A remote attacker could use this flaw to crash Pidgin via a specially-crafted SILC message.
-
-
14:01
»
Hack a Day
[Oscar] shows us how to use a Processing sketch for Android to communicate with Bluetooth devices (translated). It turns out this is easier than you might think. Processing and Android are both closely related to Java, and you can just import the Android libraries that deal with Bluetooth within the Processing sketch. That makes it easy to enable [...]
-
-
3:54
»
Hack a Day
Last year [Bob] didn’t let the little kids get some candy and continue on their way without giving them quite a fright first. His modified trashcan lures you in and then scares the bejesus out of you. He calls it Oscar the Trash-bot. The image on the left shows a ghoulish-looking head peeking out of [...]
-
-
12:02
»
Hack a Day
This alarm system senses motion and then alerts you by phone. [Oscar] had an old external modem sitting around and, with some wise hardware choices, he came up with a simple circuit to use it. First up is the PIC 16F628A chosen because it doesn’t require an external crystal. This connects with the modem via [...]
-
-
7:02
»
Hack a Day
After a gruesome accident involving a harvester, [Oscar] lost his legs. [Noel Fitzpatrick] a mad scientist veterinary surgeon came to the rescue. [Oscar] now has leg implants prosthetic feet. It is pretty amazing that a cat would even function in this manner. Have you ever seen one try to walk with tape on its feet? [...]
-
-
13:58
»
Packet Storm Security Recent Files
Mandriva Linux Security Advisory 2010-085 - The OSCAR protocol plugin in libpurple in Pidgin before 2.6.3 and Adium before 1.3.7 allows remote attackers to cause a denial of service (application crash) via crafted contact-list data for ICQ and possibly AIM, as demonstrated by the SIM IM client. Directory traversal vulnerability in slp.c in the MSN protocol plugin in libpurple in Pidgin 2.6.4 and Adium 1.3.8 allows remote attackers to read arbitrary files via a .. (dot dot) in an application/x-msnmsgrp2p MSN emoticon (aka custom smiley) request, a related issue to CVE-2004-0122. Directory traversal vulnerability in slp.c in the MSN protocol plugin in libpurple in Pidgin 2.6.4 and Adium 1.3.8 allows remote attackers to read arbitrary files via a .. (dot dot) in an application/x-msnmsgrp2p MSN emoticon (aka custom smiley) request, a related issue to CVE-2004-0122. Other issues have also been identified.
-
13:58
»
Packet Storm Security Advisories
Mandriva Linux Security Advisory 2010-085 - The OSCAR protocol plugin in libpurple in Pidgin before 2.6.3 and Adium before 1.3.7 allows remote attackers to cause a denial of service (application crash) via crafted contact-list data for ICQ and possibly AIM, as demonstrated by the SIM IM client. Directory traversal vulnerability in slp.c in the MSN protocol plugin in libpurple in Pidgin 2.6.4 and Adium 1.3.8 allows remote attackers to read arbitrary files via a .. (dot dot) in an application/x-msnmsgrp2p MSN emoticon (aka custom smiley) request, a related issue to CVE-2004-0122. Directory traversal vulnerability in slp.c in the MSN protocol plugin in libpurple in Pidgin 2.6.4 and Adium 1.3.8 allows remote attackers to read arbitrary files via a .. (dot dot) in an application/x-msnmsgrp2p MSN emoticon (aka custom smiley) request, a related issue to CVE-2004-0122. Other issues have also been identified.