CVE-2002-0384

Buffer overflow in Jabber plug-in for Gaim client before 0.58 allows remote attackers to execute arbitrary code.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rob_flynn:gaim:0.51:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.52:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.53:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.54:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.55:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.56:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.57:*:*:*:*:*:*:*

History

20 Nov 2024, 23:38

Type Values Removed Values Added
References () http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:054 - () http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:054 -
References () http://online.securityfocus.com/advisories/4358 - () http://online.securityfocus.com/advisories/4358 -
References () http://www.iss.net/security_center/static/9766.php - Vendor Advisory () http://www.iss.net/security_center/static/9766.php - Vendor Advisory
References () http://www.osvdb.org/3729 - () http://www.osvdb.org/3729 -
References () http://www.redhat.com/support/errata/RHSA-2002-098.html - Patch, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2002-098.html - Patch, Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2002-107.html - () http://www.redhat.com/support/errata/RHSA-2002-107.html -
References () http://www.redhat.com/support/errata/RHSA-2002-122.html - () http://www.redhat.com/support/errata/RHSA-2002-122.html -
References () http://www.redhat.com/support/errata/RHSA-2003-156.html - () http://www.redhat.com/support/errata/RHSA-2003-156.html -
References () http://www.securityfocus.com/bid/5406 - Patch, Vendor Advisory () http://www.securityfocus.com/bid/5406 - Patch, Vendor Advisory

Information

Published : 2002-10-04 04:00

Updated : 2024-11-20 23:38


NVD link : CVE-2002-0384

Mitre link : CVE-2002-0384

CVE.ORG link : CVE-2002-0384


JSON object : View

Products Affected

rob_flynn

  • gaim