Gaim contains a buffer overflow vulnerability in the http_canread() function

2004-05-06T00:00:00
ID VU:444158
Type cert
Reporter CERT
Modified 2004-05-06T00:00:00

Description

Overview

There is a buffer overflow vulnerability in the Gaim http_canread() function, which could allow an unauthenticated, remote attacker to execute arbitrary code.

Description

Gaim is a multi-protocol instant messenger available for a number of operating systems. It provides a feature that allows users to configure an HTTP proxy for connecting to the server. There is a buffer overflow vulnerability in the http_canread() function. When parsing data returned by the HTTP proxy server, the http_canread() function fails to perform proper adequate bounds checking on this data. Exploitation of this vulnerability could allow an unauthenticated, remote attacker to execute arbitrary code.


Impact

An unauthenticated, remote attacker could execute arbitrary code with the privileges of the vulnerable process.


Solution

Upgrade

Upgrade to Gaim version 0.76 or later.


Systems Affected

Vendor| Status| Date Notified| Date Updated
---|---|---|---
Gaim| | -| 06 May 2004
If you are a vendor and your product is affected, let us know.

CVSS Metrics

Group | Score | Vector
---|---|---
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | N/A | N/A

References

Credit

This vulnerability was publicly reported by Stefan Esser of e-matters .

This document was written by Damon Morda.

Other Information

  • CVE IDs: CAN-2004-0006
  • Date Public: 26 Jan 2004
  • Date First Published: 06 May 2004
  • Date Last Updated: 06 May 2004
  • Severity Metric: 6.69
  • Document Revision: 6