Gaim 0.57 stores sensitive information in world-readable and group-writable files in the /tmp directory, which allows local users to access MSN web email accounts of other users who run Gaim by reading authentication information from the files.
References
Configurations
History
20 Nov 2024, 23:38
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/vuln-dev/2002-q2/0584.html - | |
References | () http://gaim.sourceforge.net/ChangeLog - Vendor Advisory | |
References | () http://marc.info/?l=bugtraq&m=102130733815285&w=2 - | |
References | () http://www.iss.net/security_center/static/9061.php - | |
References | () http://www.securityfocus.com/bid/4730 - |
Information
Published : 2002-05-29 04:00
Updated : 2024-11-20 23:38
NVD link : CVE-2002-0377
Mitre link : CVE-2002-0377
CVE.ORG link : CVE-2002-0377
JSON object : View
Products Affected
rob_flynn
- gaim
CWE