search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Gaim contains an off-by-one buffer overflow vulnerability in the gaim_quotedp_decode() function

Vulnerability Note VU#226974

Original Release Date: 2004-04-30 | Last Revised: 2004-05-06

Overview

There is an off-by-one buffer overflow vulnerability in the Gaim MIME decoder.

Description

Gaim is a multi-protocol instant messenger available for a number of operating systems. It includes a feature that requires Gaim to decode MIME-encoded data. There is an off-by-one buffer overflow vulnerability in the gaim_quotedp_decode() function. This function fails to properly decode quoted printable strings used for email notification functions. By supplying a specially crafted quoted printable string, an unauthenticated, remote attacker may be able to cause a null byte to be overwritten.

Impact

An unauthenticated, remote attacker may cause a denial of service or potentially execute code of the attacker's choice.

Solution

Upgrade

Upgrade to Gaim version 0.76 or later.

Apply a patch
The maintainers of Gaim have supplied a patch to address this vulnerability.

Vendor Information

226974
 

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was publicly reported by Stefan Esser of e-matters.

This document was written by Damon Morda.

Other Information

CVE IDs: CVE-2004-0005
Severity Metric: 7.88
Date Public: 2004-01-26
Date First Published: 2004-04-30
Date Last Updated: 2004-05-06 18:20 UTC
Document Revision: 12

Sponsored by CISA.