First published: Thu Oct 21 2004(Updated: )
Buffer overflow in the MSN protocol handler for gaim 0.79 to 1.0.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an "unexpected sequence of MSNSLP messages" that results in an unbounded copy operation that writes to the wrong buffer.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rob Flynn Gaim | =0.71 | |
Rob Flynn Gaim | =0.10.3 | |
Rob Flynn Gaim | =0.61 | |
Rob Flynn Gaim | =0.82.1 | |
Rob Flynn Gaim | =0.53 | |
Rob Flynn Gaim | =0.73 | |
Rob Flynn Gaim | =1.0 | |
Rob Flynn Gaim | =0.60 | |
Rob Flynn Gaim | =1.0.1 | |
Rob Flynn Gaim | =0.69 | |
Rob Flynn Gaim | =0.52 | |
Rob Flynn Gaim | =0.72 | |
Rob Flynn Gaim | =0.65 | |
Rob Flynn Gaim | =0.59 | |
Rob Flynn Gaim | =0.62 | |
Rob Flynn Gaim | =0.78 | |
Rob Flynn Gaim | =0.74 | |
Rob Flynn Gaim | =0.51 | |
Rob Flynn Gaim | =0.56 | |
Rob Flynn Gaim | =0.54 | |
Rob Flynn Gaim | =0.55 | |
Rob Flynn Gaim | =0.82 | |
Rob Flynn Gaim | =0.68 | |
Rob Flynn Gaim | =0.67 | |
Rob Flynn Gaim | =0.10 | |
Rob Flynn Gaim | =0.59.1 | |
Rob Flynn Gaim | =0.70 | |
Rob Flynn Gaim | =0.50 | |
Rob Flynn Gaim | =0.66 | |
Rob Flynn Gaim | =0.63 | |
Rob Flynn Gaim | =0.64 | |
Rob Flynn Gaim | =0.58 | |
Rob Flynn Gaim | =0.75 | |
Rob Flynn Gaim | =0.57 | |
Slackware Slackware Linux | =9.0 | |
Slackware Slackware Linux | =10.0 | |
Ubuntu Ubuntu Linux | =4.1 | |
Slackware Slackware Linux | =9.1 | |
Slackware Slackware Linux | =current | |
Gentoo Linux | =1.4 | |
Ubuntu Ubuntu Linux | =4.1 | |
Gentoo Linux | ||
ubuntu/gaim | <1.5.0+1.5.1 | 1.5.0+1.5.1 |
ubuntu/gaim | <1.5.0+1.5.1 | 1.5.0+1.5.1 |
ubuntu/gaim | <1.5.0+1.5.1 | 1.5.0+1.5.1 |
debian/gaim |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.