First published: Tue Feb 03 2004(Updated: )
Multiple buffer overflows in Gaim 0.75 allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) octal encoding in yahoo_decode that causes a null byte to be written beyond the buffer, (2) octal encoding in yahoo_decode that causes a pointer to reference memory beyond the terminating null byte, (3) a quoted printable string to the gaim_quotedp_decode MIME decoder that causes a null byte to be written beyond the buffer, and (4) quoted printable encoding in gaim_quotedp_decode that causes a pointer to reference memory beyond the terminating null byte.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gaim | =0.75 | |
Gaim | =0.75 | |
Gaim | =0.75 |
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.361158
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0005 has a high severity level due to potential remote code execution and denial of service risks.
To fix CVE-2004-0005, upgrade to a patched version of Gaim that addresses these buffer overflow vulnerabilities.
Gaim version 0.75 is the only affected version for CVE-2004-0005.
CVE-2004-0005 is categorized as a buffer overflow vulnerability.
Yes, CVE-2004-0005 can be exploited remotely, allowing attackers to execute arbitrary code.