CVE-2004-0785

Multiple buffer overflows in Gaim before 0.82 allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) Rich Text Format (RTF) messages, (2) a long hostname for the local system as obtained from DNS, or (3) a long URL that is not properly handled by the URL decoder.
References
Link Resource
http://gaim.sourceforge.net/security/?id=3 Patch Vendor Advisory
http://gaim.sourceforge.net/security/?id=4
http://gaim.sourceforge.net/security/?id=5
http://secunia.com/advisories/12383
http://secunia.com/advisories/12480
http://secunia.com/advisories/12929
http://secunia.com/advisories/13101
http://securitytracker.com/id?1011083
http://www.fedoranews.org/updates/FEDORA-2004-278.shtml Patch Vendor Advisory
http://www.fedoranews.org/updates/FEDORA-2004-279.shtml Patch Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200408-27.xml Vendor Advisory
http://www.osvdb.org/9261
http://www.osvdb.org/9262
http://www.osvdb.org/9263
http://www.redhat.com/support/errata/RHSA-2004-400.html
http://www.securityfocus.com/bid/11056
https://exchange.xforce.ibmcloud.com/vulnerabilities/17141
https://exchange.xforce.ibmcloud.com/vulnerabilities/17142
https://exchange.xforce.ibmcloud.com/vulnerabilities/17143
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10907
http://gaim.sourceforge.net/security/?id=3 Patch Vendor Advisory
http://gaim.sourceforge.net/security/?id=4
http://gaim.sourceforge.net/security/?id=5
http://secunia.com/advisories/12383
http://secunia.com/advisories/12480
http://secunia.com/advisories/12929
http://secunia.com/advisories/13101
http://securitytracker.com/id?1011083
http://www.fedoranews.org/updates/FEDORA-2004-278.shtml Patch Vendor Advisory
http://www.fedoranews.org/updates/FEDORA-2004-279.shtml Patch Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200408-27.xml Vendor Advisory
http://www.osvdb.org/9261
http://www.osvdb.org/9262
http://www.osvdb.org/9263
http://www.redhat.com/support/errata/RHSA-2004-400.html
http://www.securityfocus.com/bid/11056
https://exchange.xforce.ibmcloud.com/vulnerabilities/17141
https://exchange.xforce.ibmcloud.com/vulnerabilities/17142
https://exchange.xforce.ibmcloud.com/vulnerabilities/17143
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10907
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rob_flynn:gaim:0.10:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.10.3:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.50:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.51:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.52:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.53:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.54:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.55:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.56:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.57:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.58:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.59:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.59.1:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.60:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.61:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.62:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.63:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.64:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.65:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.66:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.67:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.68:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.69:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.70:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.71:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.72:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.73:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.74:*:*:*:*:*:*:*
cpe:2.3:a:rob_flynn:gaim:0.75:*:*:*:*:*:*:*

History

20 Nov 2024, 23:49

Type Values Removed Values Added
References () http://gaim.sourceforge.net/security/?id=3 - Patch, Vendor Advisory () http://gaim.sourceforge.net/security/?id=3 - Patch, Vendor Advisory
References () http://gaim.sourceforge.net/security/?id=4 - () http://gaim.sourceforge.net/security/?id=4 -
References () http://gaim.sourceforge.net/security/?id=5 - () http://gaim.sourceforge.net/security/?id=5 -
References () http://secunia.com/advisories/12383 - () http://secunia.com/advisories/12383 -
References () http://secunia.com/advisories/12480 - () http://secunia.com/advisories/12480 -
References () http://secunia.com/advisories/12929 - () http://secunia.com/advisories/12929 -
References () http://secunia.com/advisories/13101 - () http://secunia.com/advisories/13101 -
References () http://securitytracker.com/id?1011083 - () http://securitytracker.com/id?1011083 -
References () http://www.fedoranews.org/updates/FEDORA-2004-278.shtml - Patch, Vendor Advisory () http://www.fedoranews.org/updates/FEDORA-2004-278.shtml - Patch, Vendor Advisory
References () http://www.fedoranews.org/updates/FEDORA-2004-279.shtml - Patch, Vendor Advisory () http://www.fedoranews.org/updates/FEDORA-2004-279.shtml - Patch, Vendor Advisory
References () http://www.gentoo.org/security/en/glsa/glsa-200408-27.xml - Vendor Advisory () http://www.gentoo.org/security/en/glsa/glsa-200408-27.xml - Vendor Advisory
References () http://www.osvdb.org/9261 - () http://www.osvdb.org/9261 -
References () http://www.osvdb.org/9262 - () http://www.osvdb.org/9262 -
References () http://www.osvdb.org/9263 - () http://www.osvdb.org/9263 -
References () http://www.redhat.com/support/errata/RHSA-2004-400.html - () http://www.redhat.com/support/errata/RHSA-2004-400.html -
References () http://www.securityfocus.com/bid/11056 - () http://www.securityfocus.com/bid/11056 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/17141 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/17141 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/17142 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/17142 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/17143 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/17143 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10907 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10907 -

Information

Published : 2004-10-20 04:00

Updated : 2024-11-20 23:49


NVD link : CVE-2004-0785

Mitre link : CVE-2004-0785

CVE.ORG link : CVE-2004-0785


JSON object : View

Products Affected

rob_flynn

  • gaim