First published: Thu Oct 21 2004(Updated: )
Buffer overflow in the MSN protocol handler for gaim 0.79 to 1.0.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an "unexpected sequence of MSNSLP messages" that results in an unbounded copy operation that writes to the wrong buffer.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/gaim | <1.5.0+1.5.1 | 1.5.0+1.5.1 |
ubuntu/gaim | <1.5.0+1.5.1 | 1.5.0+1.5.1 |
ubuntu/gaim | <1.5.0+1.5.1 | 1.5.0+1.5.1 |
debian/gaim | ||
Gaim | =0.10 | |
Gaim | =0.10.3 | |
Gaim | =0.50 | |
Gaim | =0.51 | |
Gaim | =0.52 | |
Gaim | =0.53 | |
Gaim | =0.54 | |
Gaim | =0.55 | |
Gaim | =0.56 | |
Gaim | =0.57 | |
Gaim | =0.58 | |
Gaim | =0.59 | |
Gaim | =0.59.1 | |
Gaim | =0.60 | |
Gaim | =0.61 | |
Gaim | =0.62 | |
Gaim | =0.63 | |
Gaim | =0.64 | |
Gaim | =0.65 | |
Gaim | =0.66 | |
Gaim | =0.67 | |
Gaim | =0.68 | |
Gaim | =0.69 | |
Gaim | =0.70 | |
Gaim | =0.71 | |
Gaim | =0.72 | |
Gaim | =0.73 | |
Gaim | =0.74 | |
Gaim | =0.75 | |
Gaim | =0.78 | |
Gaim | =0.82 | |
Gaim | =0.82.1 | |
Gaim | =1.0 | |
Gaim | =1.0.1 | |
Gentoo Linux | ||
Gentoo Linux | =1.4 | |
Slackware Linux | =9.0 | |
Slackware Linux | =9.1 | |
Slackware Linux | =10.0 | |
Slackware Linux | =current | |
Ubuntu Linux | =4.1 | |
Ubuntu Linux | =4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2004-0891 is high due to its potential to cause application crashes and arbitrary code execution.
To fix CVE-2004-0891, upgrade to gaim version 1.5.0 or later.
CVE-2004-0891 affects gaim versions 0.79 through 1.0.1, among others.
Yes, CVE-2004-0891 can lead to a denial of service by crashing the application.
CVE-2004-0891 should no longer pose a risk if the software has been updated to the fixed version.