CVE-2003-0163

decrypt_msg for the Gaim-Encryption GAIM plugin 1.15 and earlier does not properly validate a message length parameter, which allows remote attackers to cause a denial of service (crash) via a negative length, which overwrites arbitrary heap memory with a zero byte.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gaim-encryption:gaim-encryption:1.13:*:*:*:*:*:*:*
cpe:2.3:a:gaim-encryption:gaim-encryption:1.14:*:*:*:*:*:*:*
cpe:2.3:a:gaim-encryption:gaim-encryption:1.15:*:*:*:*:*:*:*

History

20 Nov 2024, 23:44

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=105013281120352&w=2 - () http://marc.info/?l=bugtraq&m=105013281120352&w=2 -
References () http://www.rapid7.com/advisories/R7-0013.html - Patch, Vendor Advisory () http://www.rapid7.com/advisories/R7-0013.html - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/7182 - Patch, Vendor Advisory () http://www.securityfocus.com/bid/7182 - Patch, Vendor Advisory

Information

Published : 2003-05-05 04:00

Updated : 2025-04-03 01:03


NVD link : CVE-2003-0163

Mitre link : CVE-2003-0163

CVE.ORG link : CVE-2003-0163


JSON object : View

Products Affected

gaim-encryption

  • gaim-encryption