Overview
There is a buffer overflow vulnerability in the gaim_markup_extract_info_field() function, which could allow an unauthenticated, remote attacker to cause a denial of service or execute arbitrary code.
Description
Gaim is a multi-protocol instant messenger client available for a number of operating systems. There is a buffer overflow vulnerability in the gaim_markup_extract_info_field() function. This function is used by the Yahoo Messenger (YMSG) and MSN protocol handlers. Within this function, a buffer with a fixed size of 1024 bytes is allocated in memory. When copying data, the function fails to check the size of the data copied to the buffer. This could result in a buffer overflow. |
Impact
An unauthenticated, remote attacker could cause a denial of service or potentially execute arbitrary code with the privileges of the vulnerable process. |
Solution
Upgrade Upgrade to Gaim version 0.75 or later. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This vulnerability was publicly reported by Stefan Esser of e-matters.
This document was written by Damon Morda.
Other Information
CVE IDs: | CVE-2004-0007 |
Severity Metric: | 11.81 |
Date Public: | 2004-01-26 |
Date First Published: | 2004-05-10 |
Date Last Updated: | 2004-05-10 19:37 UTC |
Document Revision: | 12 |