Overview
There is a buffer overflow vulnerability in the Gaim gaim_quotedp_decode() function, which could cause a pointer to reference memory beyond the terminating null byte.
Description
Gaim is a multi-protocol instant messenger available for a number of operating systems. It includes a feature that requires Gaim to decode MIME-encoded data. There is a buffer overflow vulnerability in the gaim_quotedp_decode() function. This function fails to properly allocate memory for quoted printable strings, which could result in a pointer referencing a memory location beyond the terminating null byte. |
Impact
An unauthenticated, remote attacker may cause a denial of service or potentially execute code of the attacker's choice. |
Solution
Upgrade Upgrade to Gaim version 0.76 or later. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This vulnerability was publicly reported by Stefan Esser of e-matters.
This document was written by Damon Morda.
Other Information
CVE IDs: | CVE-2004-0005 |
Severity Metric: | 7.88 |
Date Public: | 2004-01-26 |
Date First Published: | 2004-04-30 |
Date Last Updated: | 2004-05-06 18:20 UTC |
Document Revision: | 19 |