Vulnerability Name: | CVE-2004-0008 (CCN-14937) | ||||||||||||||||||||
Assigned: | 2004-01-26 | ||||||||||||||||||||
Published: | 2004-01-26 | ||||||||||||||||||||
Updated: | 2017-10-11 | ||||||||||||||||||||
Summary: | Integer overflow in Gaim 0.74 and earlier, and Ultramagnetic before 0.81, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a directIM packet that triggers a heap-based buffer overflow. | ||||||||||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||
References: | Source: SGI Type: UNKNOWN 20040201-01-U Source: SGI Type: UNKNOWN 20040202-01-U Source: CCN Type: Full-Disclosure Mailing List, Mon Jan 26 2004 - 02:44:42 CST Advisory 01/2004: 12 x Gaim remote overflows Source: FULLDISC Type: UNKNOWN 20040126 Advisory 01/2004: 12 x Gaim remote overflows Source: MITRE Type: CNA CVE-2004-0008 Source: CONECTIVA Type: UNKNOWN CLA-2004:813 Source: CCN Type: Conectiva Linux Security Announcement CLSA-2004:813 gaim Source: CCN Type: Sourceforge Gaim Web site Downloads Source: BUGTRAQ Type: UNKNOWN 20040126 Advisory 01/2004: 12 x Gaim remote overflows Source: BUGTRAQ Type: UNKNOWN 20040127 [slackware-security] GAIM security update (SSA:2004-026-01) Source: BUGTRAQ Type: UNKNOWN 20040127 Ultramagnetic Advisory #001: Multiple vulnerabilities in Gaim code Source: CCN Type: RHSA-2004-032 Updated Gaim packages fix various vulnerabiliies Source: CCN Type: RHSA-2004-033 gaim security update Source: CCN Type: RHSA-2004-045 gaim security update Source: MISC Type: Patch, Vendor Advisory http://security.e-matters.de/advisories/012004.html Source: GENTOO Type: UNKNOWN GLSA-200401-04 Source: CCN Type: SECTRACK ID: 1008850 Gaim Contains Multiple Overflows That Let a Remote User Execute Arbitrary Code Source: CONFIRM Type: Patch, Vendor Advisory http://ultramagnetic.sourceforge.net/advisories/001.html Source: DEBIAN Type: UNKNOWN DSA-434 Source: DEBIAN Type: DSA-434 gaim -- several vulnerabilities Source: CCN Type: GLSA-200401-04 GAIM 0.75 Remote overflows Source: CCN Type: US-CERT VU#779614 Gaim contains an integer overflow vulnerability when parsing DirectIM packets Source: CERT-VN Type: Third Party Advisory, US Government Resource VU#779614 Source: CCN Type: Gentoo Linux Security Announcement 200401-04 GAIM 0.75 Remote overflows Source: MANDRAKE Type: UNKNOWN MDKSA-2004:006 Source: OSVDB Type: UNKNOWN 3734 Source: CCN Type: OSVDB ID: 3734 Gaim DirectIM AIM/Oscar Integer Buffer Overflow Source: REDHAT Type: Patch, Vendor Advisory RHSA-2004:032 Source: REDHAT Type: UNKNOWN RHSA-2004:033 Source: REDHAT Type: UNKNOWN RHSA-2004:045 Source: SECTRACK Type: UNKNOWN 1008850 Source: CCN Type: slackware-security Mailing List, Mon, 26 Jan 2004 16:14:45 -0800 (PST) GAIM security update (SSA:2004-026-01) Source: XF Type: UNKNOWN gaim-directim-bo(14937) Source: XF Type: UNKNOWN gaim-directim-bo(14937) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:820 Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:9469 | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Denotes that component is vulnerable | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |