Vulnerability Name: | CVE-2004-0785 (CCN-17141) | ||||||||||||||||
Assigned: | 2004-08-12 | ||||||||||||||||
Published: | 2004-08-12 | ||||||||||||||||
Updated: | 2017-10-11 | ||||||||||||||||
Summary: | Multiple buffer overflows in Gaim before 0.82 allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) Rich Text Format (RTF) messages, (2) a long hostname for the local system as obtained from DNS, or (3) a long URL that is not properly handled by the URL decoder. | ||||||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2004-0785 Source: CCN Type: Conectiva Linux Security Announcement CLSA-2004:884 Fixes for gaim's vulnerabilities Source: CCN Type: Gaim Download Web page Downloads - gaim Source: CONFIRM Type: Patch, Vendor Advisory http://gaim.sourceforge.net/security/?id=3 Source: CONFIRM Type: UNKNOWN http://gaim.sourceforge.net/security/?id=4 Source: CCN Type: Gaim Security Issues Web page RTF message buffer overflow Source: CONFIRM Type: UNKNOWN http://gaim.sourceforge.net/security/?id=5 Source: CCN Type: RHSA-2004-400 gaim security update Source: SECUNIA Type: UNKNOWN 12383 Source: SECUNIA Type: UNKNOWN 12480 Source: SECUNIA Type: UNKNOWN 12929 Source: SECUNIA Type: UNKNOWN 13101 Source: CCN Type: SECTRACK ID: 1011083 Gaim Buffer Overflows in Groupware Messages, URLs, Hostname Lookups, and RTF Messages May Permit Remote Code Execution Source: SECTRACK Type: UNKNOWN 1011083 Source: CCN Type: Slackware Security Advisory SSA:2004-240-01 gaim updated again Source: CCN Type: Slackware Security Advisory SSA:2004-239-01 gaim Source: FEDORA Type: Patch, Vendor Advisory FEDORA-2004-278 Source: FEDORA Type: Patch, Vendor Advisory FEDORA-2004-279 Source: CCN Type: GLSA-200408-27 Gaim: New vulnerabilities Source: GENTOO Type: Vendor Advisory GLSA-200408-27 Source: OSVDB Type: UNKNOWN 9261 Source: OSVDB Type: UNKNOWN 9262 Source: OSVDB Type: UNKNOWN 9263 Source: CCN Type: OSVDB ID: 9261 Gaim URL Decode Overflow Source: CCN Type: OSVDB ID: 9262 Gaim Local Hostname Resolution Overflow Source: CCN Type: OSVDB ID: 9263 Gaim RTF Message Overflow Source: REDHAT Type: UNKNOWN RHSA-2004:400 Source: BID Type: UNKNOWN 11056 Source: CCN Type: BID-11056 Gaim Multiple Vulnerabilities Source: XF Type: UNKNOWN gaim-rtf-bo(17141) Source: XF Type: UNKNOWN gaim-rtf-bo(17141) Source: XF Type: UNKNOWN gaim-hostname-bo(17142) Source: XF Type: UNKNOWN gaim-url-bo(17143) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:10907 Source: SUSE Type: SUSE-SA:2004:032 apache2: remote denial-of-service Source: SUSE Type: SUSE-SA:2004:033 gtk2 gdk-pixbuf: remote code execution Source: SUSE Type: SUSE-SA:2004:034 XFree86-libs xshared: remote command execution | ||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Denotes that component is vulnerable | ||||||||||||||||
Vulnerability Name: | CVE-2004-0785 (CCN-17142) | ||||||||||||||||
Assigned: | 2004-08-12 | ||||||||||||||||
Published: | 2004-08-12 | ||||||||||||||||
Updated: | 2004-08-26 | ||||||||||||||||
Summary: | Multiple buffer overflows in Gaim before 0.82 allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) Rich Text Format (RTF) messages, (2) a long hostname for the local system as obtained from DNS, or (3) a long URL that is not properly handled by the URL decoder. | ||||||||||||||||
CVSS v3 Severity: | 5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2004-0785 Source: CCN Type: Conectiva Linux Security Announcement CLSA-2004:884 Fixes for gaim's vulnerabilities Source: CCN Type: Gaim Download Web page Downloads - gaim Source: CCN Type: Gaim Security Issues Web page Local hostname resolution buffer overflow Source: CCN Type: RHSA-2004-400 gaim security update Source: CCN Type: SECTRACK ID: 1011083 Gaim Buffer Overflows in Groupware Messages, URLs, Hostname Lookups, and RTF Messages May Permit Remote Code Execution Source: CCN Type: Slackware Security Advisory SSA:2004-240-01 gaim updated again Source: CCN Type: Slackware Security Advisory SSA:2004-239-01 gaim Source: CCN Type: GLSA-200408-27 Gaim: New vulnerabilities Source: CCN Type: OSVDB ID: 9261 Gaim URL Decode Overflow Source: CCN Type: OSVDB ID: 9262 Gaim Local Hostname Resolution Overflow Source: CCN Type: OSVDB ID: 9263 Gaim RTF Message Overflow Source: CCN Type: BID-11056 Gaim Multiple Vulnerabilities Source: XF Type: UNKNOWN gaim-hostname-bo(17142) Source: SUSE Type: SUSE-SA:2004:032 apache2: remote denial-of-service Source: SUSE Type: SUSE-SA:2004:033 gtk2 gdk-pixbuf: remote code execution Source: SUSE Type: SUSE-SA:2004:034 XFree86-libs xshared: remote command execution | ||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1: Denotes that component is vulnerable | ||||||||||||||||
Vulnerability Name: | CVE-2004-0785 (CCN-17143) | ||||||||||||||||
Assigned: | 2004-08-12 | ||||||||||||||||
Published: | 2004-08-12 | ||||||||||||||||
Updated: | 2017-10-11 | ||||||||||||||||
Summary: | Multiple buffer overflows in Gaim before 0.82 allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) Rich Text Format (RTF) messages, (2) a long hostname for the local system as obtained from DNS, or (3) a long URL that is not properly handled by the URL decoder. | ||||||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2004-0785 Source: CCN Type: Conectiva Linux Security Announcement CLSA-2004:884 Fixes for gaim's vulnerabilities Source: CCN Type: Gaim Download Web page Downloads - gaim Source: CCN Type: Gaim Security Issues Web page URL decode buffer overflow Source: CCN Type: RHSA-2004-400 gaim security update Source: CCN Type: SECTRACK ID: 1011083 Gaim Buffer Overflows in Groupware Messages, URLs, Hostname Lookups, and RTF Messages May Permit Remote Code Execution Source: CCN Type: Slackware Security Advisory SSA:2004-240-01 gaim updated again Source: CCN Type: Slackware Security Advisory SSA:2004-239-01 gaim Source: CCN Type: GLSA-200408-27 Gaim: New vulnerabilities Source: CCN Type: OSVDB ID: 9261 Gaim URL Decode Overflow Source: CCN Type: OSVDB ID: 9262 Gaim Local Hostname Resolution Overflow Source: CCN Type: OSVDB ID: 9263 Gaim RTF Message Overflow Source: CCN Type: BID-11056 Gaim Multiple Vulnerabilities Source: XF Type: UNKNOWN gaim-url-bo(17143) Source: SUSE Type: SUSE-SA:2004:032 apache2: remote denial-of-service Source: SUSE Type: SUSE-SA:2004:033 gtk2 gdk-pixbuf: remote code execution Source: SUSE Type: SUSE-SA:2004:034 XFree86-libs xshared: remote command execution | ||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1: Denotes that component is vulnerable | ||||||||||||||||
Oval Definitions | |||||||||||||||||
| |||||||||||||||||
BACK |