Overview
Description
Gaim is a multi-protocol instant messenger available for a number of operating systems. It supports a variety of instant messaging protocols, including the Yahoo Messenger (YMSG) protocol. There is a buffer overflow vulnerability in the yahoo_web_pending() function. This function is responsible for parsing cookies in HTTP reply headers for Yahoo web connections. When parsing the HTTP reply header, the first 1024 bytes of cookie data is copied into a 256 byte buffer without performing adequate bounds checking. |
Impact
An unauthenticated, remote attacker could potentially execute arbitrary code with the privileges of the vulnerable process. |
Solution
Upgrade Upgrade to Gaim version 0.76 or later. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This vulnerability was reported by Stefan Esser of e-matters.
This document was written by Damon Morda.
Other Information
CVE IDs: | CVE-2004-0006 |
Severity Metric: | 5.25 |
Date Public: | 2004-01-26 |
Date First Published: | 2004-05-06 |
Date Last Updated: | 2004-05-06 19:47 UTC |
Document Revision: | 12 |