First published: Thu Sep 02 2004(Updated: )
Multiple buffer overflows in Gaim before 0.82 allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) Rich Text Format (RTF) messages, (2) a long hostname for the local system as obtained from DNS, or (3) a long URL that is not properly handled by the URL decoder.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gaim | =0.10 | |
Gaim | =0.10.3 | |
Gaim | =0.50 | |
Gaim | =0.51 | |
Gaim | =0.52 | |
Gaim | =0.53 | |
Gaim | =0.54 | |
Gaim | =0.55 | |
Gaim | =0.56 | |
Gaim | =0.57 | |
Gaim | =0.58 | |
Gaim | =0.59 | |
Gaim | =0.59.1 | |
Gaim | =0.60 | |
Gaim | =0.61 | |
Gaim | =0.62 | |
Gaim | =0.63 | |
Gaim | =0.64 | |
Gaim | =0.65 | |
Gaim | =0.66 | |
Gaim | =0.67 | |
Gaim | =0.68 | |
Gaim | =0.69 | |
Gaim | =0.70 | |
Gaim | =0.71 | |
Gaim | =0.72 | |
Gaim | =0.73 | |
Gaim | =0.74 | |
Gaim | =0.75 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0785 is considered a high severity vulnerability due to its potential to allow remote attackers to execute arbitrary code.
To fix CVE-2004-0785, upgrade Gaim to version 0.82 or later to mitigate the buffer overflow vulnerabilities.
CVE-2004-0785 affects Gaim versions prior to 0.82, including versions 0.10 through 0.75.
CVE-2004-0785 allows attackers to potentially cause denial of service or execute arbitrary code through crafted RTF messages or long URLs.
Yes, CVE-2004-0785 is exploitable over the network, enabling remote attackers to trigger the vulnerabilities.