Overview
There is a buffer overflow vulnerability in the gaim_markup_extract_info_field() function, which could allow an unauthenticated, remote attacker to cause a denial of service or execute arbitrary code.
Description
Gaim is a multi-protocol instant messenger client available for a number of operating systems. There is a buffer overflow vulnerability in the gaim_markup_extract_info_field() function. This function is used by the Yahoo Messenger (YMSG) and MSN protocol handlers. Within this function, a buffer with a fixed size of 1024 bytes is allocated in memory. When copying data, the function fails to check the size of the data copied to the buffer. This could result in a buffer overflow. |
Impact
An unauthenticated, remote attacker could cause a denial of service or potentially execute arbitrary code with the privileges of the vulnerable process. |
Solution
Upgrade Upgrade to Gaim version 0.75 or later. |
Vendor Information
CVSS Metrics
| Group | Score | Vector |
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental |
References
Acknowledgements
This vulnerability was publicly reported by Stefan Esser of e-matters.
This document was written by Damon Morda.
Other Information
| CVE IDs: | CVE-2004-0007 |
| Severity Metric: | 11.81 |
| Date Public: | 2004-01-26 |
| Date First Published: | 2004-05-10 |
| Date Last Updated: | 2004-05-10 19:37 UTC |
| Document Revision: | 12 |