Gaim is a multi-protocol instant messenger available for a number of operating systems. It supports a variety of instant messaging protocols, including the Yahoo Messenger (YMSG) protocol. There is a buffer overflow vulnerability in the yahoo_web_pending() function. This function is responsible for parsing cookies in HTTP reply headers for Yahoo web connections. When parsing the HTTP reply header, the first 1024 bytes of cookie data is copied into a 256 byte buffer without performing adequate bounds checking.
An unauthenticated, remote attacker could potentially execute arbitrary code with the privileges of the vulnerable process.
Upgrade to Gaim version 0.76 or later.
This vulnerability was reported by Stefan Esser of e-matters.
This document was written by Damon Morda.
|Date First Published:||2004-05-06|
|Date Last Updated:||2004-05-06 19:47 UTC|