search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Gaim contains a buffer overflow vulnerability in the yahoo_decode() function

Vulnerability Note VU#655974

Original Release Date: 2004-04-30 | Last Revised: 2004-05-06

Overview

There is a buffer overflow vulnerability in the Gaim yahoo_decode() function, which could cause a pointer to reference memory beyond the terminating null byte.

Description

Gaim is a multi-protocol instant messenger available for a number of operating systems. It supports a variety of instant messaging protocols, including the Yahoo Messenger (YMSG) protocol. There is a buffer overflow vulnerability in the yahoo_decode() function. This function fails to properly allocate memory for octal values, which could result in a pointer referencing a memory location beyond the terminating null byte.

Impact

An unauthenticated, remote attacker may cause a denial of service or potentially execute code of the attacker's choice.

Solution

Upgrade

Upgrade to Gaim version 0.76 or later.

Apply a patch
The maintainers of Gaim have supplied a patch to address this vulnerability.

Vendor Information

655974
 

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was publicly reported by Stefan Esser of e-matters.

This document was written by Damon Morda.

Other Information

CVE IDs: CVE-2004-0005
Severity Metric: 7.88
Date Public: 2004-01-26
Date First Published: 2004-04-30
Date Last Updated: 2004-05-06 18:20 UTC
Document Revision: 17

Sponsored by CISA.