CVE-2004-0500

Buffer overflow in the MSN protocol plugins (1) object.c and (2) slp.c for Gaim before 0.82 allows remote attackers to cause a denial of service and possibly execute arbitrary code via MSNSLP protocol messages that are not properly handled in a strncpy call.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rob_flynn:gaim:0.10:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.10.3:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.50:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.51:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.52:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.53:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.54:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.55:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.56:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.57:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.58:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.59:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.59.1:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.60:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.61:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.62:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.63:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.64:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.65:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.66:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.67:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.68:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.69:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.70:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.71:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.72:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.73:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.74:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.75:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*

History

20 Nov 2024, 23:48

Type Values Removed Values Added
References () http://gaim.sourceforge.net/security/?id=0 - () http://gaim.sourceforge.net/security/?id=0 -
References () http://www.fedoranews.org/updates/FEDORA-2004-278.shtml - () http://www.fedoranews.org/updates/FEDORA-2004-278.shtml -
References () http://www.fedoranews.org/updates/FEDORA-2004-279.shtml - () http://www.fedoranews.org/updates/FEDORA-2004-279.shtml -
References () http://www.gentoo.org/security/en/glsa/glsa-200408-12.xml - Patch, Vendor Advisory () http://www.gentoo.org/security/en/glsa/glsa-200408-12.xml - Patch, Vendor Advisory
References () http://www.gentoo.org/security/en/glsa/glsa-200408-27.xml - () http://www.gentoo.org/security/en/glsa/glsa-200408-27.xml -
References () http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:081 - () http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:081 -
References () http://www.novell.com/linux/security/advisories/2004_25_gaim.html - () http://www.novell.com/linux/security/advisories/2004_25_gaim.html -
References () http://www.redhat.com/support/errata/RHSA-2004-400.html - () http://www.redhat.com/support/errata/RHSA-2004-400.html -
References () http://www.securityfocus.com/bid/10865 - Patch, Vendor Advisory () http://www.securityfocus.com/bid/10865 - Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/16920 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/16920 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9429 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9429 -

Information

Published : 2004-09-28 04:00

Updated : 2024-11-20 23:48


NVD link : CVE-2004-0500

Mitre link : CVE-2004-0500

CVE.ORG link : CVE-2004-0500


JSON object : View

Products Affected

gentoo

  • linux

mandrakesoft

  • mandrake_linux

rob_flynn

  • gaim