Vulnerability Name: | CVE-2002-0384 (CCN-9766) | ||||||||
Assigned: | 2002-08-05 | ||||||||
Published: | 2002-08-05 | ||||||||
Updated: | 2008-09-10 | ||||||||
Summary: | Buffer overflow in Jabber plug-in for Gaim client before 0.58 allows remote attackers to execute arbitrary code. | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: CCN Type: Red Hat Bugzilla Bug 65263 security issues in gaim 0.57 Source: MITRE Type: CNA CVE-2002-0384 Source: MANDRAKE Type: UNKNOWN MDKSA-2002:054 Source: CCN Type: Gaim Web site ChangeLog Source: HP Type: UNKNOWN HPSBTL0208-057 Source: CCN Type: RHSA-2002-098 Updated gaim client fixes Jabber plug-in vulnerability Source: CCN Type: RHSA-2002-107 Updated gaim client fixes Jabber plug-in vulnerability (Powertools) Source: CCN Type: RHSA-2002-122 gaim security update Source: CCN Type: RHSA-2003-156 Updated gaim client fixes vulnerabilities Source: XF Type: Vendor Advisory gaim-jabber-module-bo(9766) Source: OSVDB Type: UNKNOWN 3729 Source: CCN Type: OSVDB ID: 3729 Gaim Jabber Plugin Buffer Overflow Source: REDHAT Type: Patch, Vendor Advisory RHSA-2002:098 Source: REDHAT Type: UNKNOWN RHSA-2002:107 Source: REDHAT Type: UNKNOWN RHSA-2002:122 Source: REDHAT Type: UNKNOWN RHSA-2003:156 Source: BID Type: Patch, Vendor Advisory 5406 Source: CCN Type: BID-5406 Gaim Jabber Plug-In Buffer Overflow Vulnerability Source: XF Type: UNKNOWN gaim-jabber-module-bo(9766) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |