Vulnerability Name: | CVE-2005-1261 (CCN-20541) |
Assigned: | 2005-05-11 |
Published: | 2005-05-11 |
Updated: | 2018-10-19 |
Summary: | Stack-based buffer overflow in the URL parsing function in Gaim before 1.3.0 allows remote attackers to execute arbitrary code via an instant message (IM) with a large URL. |
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): Low Integrity (I): Low Availibility (A): Low |
|
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial | 7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial |
|
Vulnerability Type: | CWE-Other
|
Vulnerability Consequences: | Gain Access |
References: | Source: MITRE Type: CNA CVE-2005-1261
Source: CCN Type: Conectiva Linux Security Announcement CLSA-2005:964 Fixes for gaim's vulnerabilities
Source: CCN Type: Gaim Download Web page Downloads
Source: CCN Type: Gaim Vulnerability Remote crash on some protocols
Source: CONFIRM Type: Patch, Vendor Advisory http://gaim.sourceforge.net/security/index.php?id=16
Source: CCN Type: RHSA-2005-429 gaim security update
Source: CCN Type: RHSA-2005-432 gaim security update
Source: CCN Type: SourceForge.net Project: Gaim: Summary
Source: CCN Type: GLSA-200505-09 Gaim: Denial of Service and buffer overflow vulnerabilties
Source: CCN Type: Jabber Software Foundation Web site Jabber: Open Instant Messanging and a Whole Lot More, Powered by XMPP
Source: REDHAT Type: Vendor Advisory RHSA-2005:429
Source: REDHAT Type: UNKNOWN RHSA-2005:432
Source: FEDORA Type: UNKNOWN FLSA:158543
Source: BID Type: UNKNOWN 13590
Source: CCN Type: BID-13590 Gaim Remote URI Handling Buffer Overflow Vulnerability
Source: CCN Type: SILC Web site SILC Secure Internet Live Conferencing
Source: CCN Type: USN-125-1 Gaim vulnerabilities
Source: VUPEN Type: UNKNOWN ADV-2005-0519
Source: XF Type: UNKNOWN gaim-message-bo(20541)
Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:10725
Source: SUSE Type: SUSE-SR:2005:015 SUSE Security Summary Report
|
Vulnerable Configuration: | Configuration 1: cpe:/a:rob_flynn:gaim:0.10:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:0.10.3:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:0.50:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:0.51:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:0.52:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:0.53:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:0.54:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:0.55:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:0.56:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:0.57:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:0.58:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:0.59:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:0.59.1:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:0.60:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:0.61:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:0.62:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:0.63:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:0.64:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:0.65:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:0.66:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:0.67:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:0.68:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:0.69:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:0.70:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:0.71:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:0.72:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:0.73:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:0.74:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:0.75:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:0.76:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:0.77:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:0.78:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:0.79:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:0.80:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:0.81:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:0.82:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:0.82.1:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:1.0.0:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:1.0.1:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:1.0.2:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:1.0.3:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:1.1.0:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:1.1.1:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:1.1.2:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:1.1.3:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:1.1.4:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:1.2.0:*:*:*:*:*:*:*OR cpe:/a:rob_flynn:gaim:1.2.1:*:*:*:*:*:*:* Configuration RedHat 1: cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |