Vulnerability Name:

CVE-2005-1934 (CCN-20996)

Assigned:2005-05-19
Published:2005-05-19
Updated:2018-10-19
Summary:Gaim before 1.3.1 allows remote attackers to cause a denial of service (crash) via a malformed MSN message that leads to a memory allocation of a large size, possibly due to an integer signedness error.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2005-1934

Source: CCN
Type: Conectiva Linux Security Announcement CLSA-2005:1006
Fixes for gaim's vulnerabilities

Source: CCN
Type: Gaim Download Web site
Downloads - Gaim

Source: CCN
Type: Gaim Vulnerability
MSN Remote DoS

Source: CCN
Type: RHSA-2005-518
gaim security update

Source: GENTOO
Type: UNKNOWN
GLSA-200506-11

Source: CONFIRM
Type: Vendor Advisory
http://sourceforge.net/tracker/index.php?func=detail&aid=1205290&group_id=235&atid=100235

Source: DEBIAN
Type: UNKNOWN
DSA-734

Source: DEBIAN
Type: DSA-734
gaim -- denial of service

Source: CCN
Type: GLSA-200506-11
Gaim: Denial of Service vulnerabilities

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2005:099

Source: SUSE
Type: UNKNOWN
SUSE-SA:2005:036

Source: REDHAT
Type: UNKNOWN
RHSA-2005:518

Source: FEDORA
Type: UNKNOWN
FLSA:158543

Source: BID
Type: UNKNOWN
13932

Source: CCN
Type: BID-13932
Gaim MSN Protocol Malformed Message Denial of Service Vulnerability

Source: CCN
Type: USN-140-1
Gaim vulnerability

Source: XF
Type: UNKNOWN
gaim-msn-message-dos(20996)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:10368

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:263

Source: SUSE
Type: SUSE-SA:2005:036
sudo: race condition arbitrary code execution

Source: SUSE
Type: SUSE-SR:2005:017
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:rob_flynn:gaim:*:*:*:*:*:*:*:* (Version <= 1.3.0)

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20051934
    V
    CVE-2005-1934
    2015-11-16
    oval:org.mitre.oval:def:10368
    V
    Gaim before 1.3.1 allows remote attackers to cause a denial of service (crash) via a malformed MSN message that leads to a memory allocation of a large size, possibly due to an integer signedness error.
    2013-04-29
    oval:org.mitre.oval:def:263
    V
    Gaim DoS via Malformed MSN Message
    2005-09-21
    oval:org.debian:def:734
    V
    denial of service
    2005-07-05
    oval:com.redhat.rhsa:def:20050518
    P
    RHSA-2005:518: gaim security update (Moderate)
    2005-06-16
    BACK
    rob_flynn gaim *