CVE-2004-0891

Buffer overflow in the MSN protocol handler for gaim 0.79 to 1.0.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an "unexpected sequence of MSNSLP messages" that results in an unbounded copy operation that writes to the wrong buffer.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rob_flynn:gaim:0.10:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.10.3:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.50:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.51:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.52:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.53:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.54:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.55:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.56:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.57:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.58:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.59:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.59.1:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.60:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.61:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.62:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.63:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.64:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.65:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.66:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.67:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.68:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.69:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.70:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.71:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.72:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.73:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.74:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.75:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.78:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.82:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.82.1:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:1.0:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:1.0.1:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*
cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:slackware:slackware_linux:current:*:*:*:*:*:*:*
cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*

History

20 Nov 2024, 23:49

Type Values Removed Values Added
References () http://gaim.sourceforge.net/security/?id=9 - Vendor Advisory () http://gaim.sourceforge.net/security/?id=9 - Vendor Advisory
References () http://www.gentoo.org/security/en/glsa/glsa-200410-23.xml - () http://www.gentoo.org/security/en/glsa/glsa-200410-23.xml -
References () http://www.redhat.com/support/errata/RHSA-2004-604.html - Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2004-604.html - Vendor Advisory
References () https://bugzilla.fedora.us/show_bug.cgi?id=2188 - () https://bugzilla.fedora.us/show_bug.cgi?id=2188 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/17786 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/17786 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/17787 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/17787 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/17790 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/17790 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11790 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11790 -
References () https://www.ubuntu.com/usn/usn-8-1/ - () https://www.ubuntu.com/usn/usn-8-1/ -

Information

Published : 2005-01-27 05:00

Updated : 2024-11-20 23:49


NVD link : CVE-2004-0891

Mitre link : CVE-2004-0891

CVE.ORG link : CVE-2004-0891


JSON object : View

Products Affected

gentoo

  • linux

rob_flynn

  • gaim

slackware

  • slackware_linux

ubuntu

  • ubuntu_linux