First published: Fri Oct 04 2002(Updated: )
Buffer overflow in Jabber plug-in for Gaim client before 0.58 allows remote attackers to execute arbitrary code.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gaim | =0.53 | |
Gaim | =0.52 | |
Gaim | =0.51 | |
Gaim | =0.56 | |
Gaim | =0.54 | |
Gaim | =0.55 | |
Gaim | =0.57 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0384 is classified as a high severity vulnerability due to its potential to allow remote code execution.
To mitigate CVE-2002-0384, upgrade the Gaim client to version 0.58 or later.
CVE-2002-0384 affects the Jabber plug-in used in the Gaim client.
CVE-2002-0384 can be exploited by remote attackers who send specially crafted Jabber messages.
Users of affected Gaim versions are at risk of arbitrary code execution, which can lead to data compromise or system control.