Debian Security Advisory DSA 2852-1 (libgadu - heap-based buffer overflow)

Summary
Yves Younan and Ryan Pentney discovered that libgadu, a library for accessing the Gadu-Gadu instant messaging service, contained an integer overflow leading to a buffer overflow. Attackers which impersonate the server could crash clients and potentially execute arbitrary code.
Solution
For the oldstable distribution (squeeze), this problem has been fixed in version 1:1.9.0-2+squeeze2. For the stable distribution (wheezy), this problem has been fixed in version 1:1.11.2-1+deb7u1. For the unstable distribution (sid), this problem has been fixed in version 1:1.11.3-1. We recommend that you upgrade your libgadu packages.
Affected
libgadu on Debian Linux
Detection
This check tests the installed software version using the apt package manager.
References