Vulnerability Note VU#779614
Gaim contains an integer overflow vulnerability when parsing DirectIM packets
There is an integer overflow vulnerability in the handlehdr_odc() function, which could allow an unauthenticated, remote attacker to cause a denial of service or potentially execute arbitrary code.
Gaim is a multi-protocol instant messenger client available for a number of operating systems. It supports a variety of instant messaging protocols, including the AIM/OSCAR protocol suite. There is an integer overflow vulnerability in the handlehdr_odc() function. This function fails to properly allocate memory when processing AIM/OSCAR DirectIM packets. By supplying a specially crafted value for the payloadlength variable, an unauthenticated, remote attacker could trigger a heap overflow.
An unauthenticated, remote attacker could cause a denial of service or potentially execute arbitrary code with the privileges of the vulnerable process.
Upgrade to Gaim version 0.75 or later.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Gaim||Affected||-||10 May 2004|
CVSS Metrics (Learn More)
This document was written by Damon Morda.
- CVE IDs: CAN-2004-0008
- Date Public: 26 Jan 2004
- Date First Published: 10 May 2004
- Date Last Updated: 10 May 2004
- Severity Metric: 11.81
- Document Revision: 10
If you have feedback, comments, or additional information about this vulnerability, please send us email.