First published: Tue Feb 03 2004(Updated: )
Multiple buffer overflows in Gaim 0.75 allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) octal encoding in yahoo_decode that causes a null byte to be written beyond the buffer, (2) octal encoding in yahoo_decode that causes a pointer to reference memory beyond the terminating null byte, (3) a quoted printable string to the gaim_quotedp_decode MIME decoder that causes a null byte to be written beyond the buffer, and (4) quoted printable encoding in gaim_quotedp_decode that causes a pointer to reference memory beyond the terminating null byte.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rob Flynn Gaim | =0.75 | |
Rob Flynn Gaim | =0.75 | |
Gaim Project Gaim | =0.75 |
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.361158
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.