First published: Tue Aug 16 2005(Updated: )
Buffer overflow in the AIM and ICQ module in Gaim before 1.5.0 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an away message with a large number of AIM substitution strings, such as %t or %n.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gaim | =1.1.4 | |
Gaim | =1.0.2 | |
Gaim | =0.81 | |
Gaim | =0.71 | |
Gaim | =0.10.3 | |
Gaim | =0.79 | |
Gaim | =0.61 | |
Gaim | =0.82.1 | |
Gaim | =0.53 | |
Gaim | =0.73 | |
Gaim | =1.1.2 | |
Gaim | =1.0 | |
Gaim | =0.60 | |
Gaim | =1.0.1 | |
Gaim | =0.69 | |
Gaim | =0.52 | |
Gaim | =1.1.0 | |
Gaim | =1.2.1 | |
Gaim | =1.3.1 | |
Gaim | =0.72 | |
Gaim | =0.65 | |
Gaim | =0.59 | |
Gaim | =0.62 | |
Gaim | =0.78 | |
Gaim | =0.74 | |
Gaim | =0.76 | |
Gaim | =0.51 | |
Gaim | =0.56 | |
Gaim | =0.54 | |
Gaim | =1.1.3 | |
Gaim | =1.2.0 | |
Gaim | =1.0.3 | |
Gaim | =1.0.0 | |
Gaim | =1.3.0 | |
Gaim | =0.55 | |
Gaim | =0.82 | |
Gaim | =0.68 | |
Gaim | =0.77 | |
Gaim | =0.80 | |
Gaim | =0.67 | |
Gaim | =0.10 | |
Gaim | =0.59.1 | |
Gaim | =1.1.1 | |
Gaim | =0.70 | |
Gaim | =0.50 | |
Gaim | =0.66 | |
Gaim | =0.63 | |
Gaim | =1.4.0 | |
Gaim | =0.64 | |
Gaim | =0.58 | |
Gaim | =0.75 | |
Gaim | =0.57 | |
Gaim | <1.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2103 is considered a high severity vulnerability due to its potential for denial of service and remote code execution.
The only effective solution for CVE-2005-2103 is to upgrade to Gaim version 1.5.0 or later which addresses this vulnerability.
CVE-2005-2103 affects Gaim versions before 1.5.0, including versions 1.4.0 and earlier.
CVE-2005-2103 is classified as a buffer overflow vulnerability in the AIM and ICQ module of Gaim.
Exploitation of CVE-2005-2103 could lead to application crashes and may allow attackers to execute arbitrary code on the affected user's system.