There is a buffer overflow vulnerability in the Gaim gaim_url_parse() function, which could allow an unauthenticated, remote attacker to execute arbitrary code.
Gaim is a multi-protocol instant messenger available for a number of operating systems. There is a buffer overflow vulnerability in the gaim_url_parse() function. This function is responsible for splitting a URL into parts. By supplying an overly long URL to this function, an unauthenticated, remote attacker could potentially execute arbitrary code.
An unauthenticated, remote attacker could potentially execute arbitrary code with the privileges of the vulnerable process.
Upgrade to Gaim version 0.76 or later.
This vulnerability was publicly reported by Stefan Esser of e-matters.
This document was written by Damon Morda.
|Date First Published:||2004-05-06|
|Date Last Updated:||2004-05-06 19:47 UTC|