{"vuid":"VU#197142","idnumber":"197142","name":"Gaim contains a buffer overflow vulnerability in the Extract Info Field function","keywords":["Gaim","buffer overflow","gaim_markup_extract_info_field() function"],"overview":"There is a buffer overflow vulnerability in the gaim_markup_extract_info_field() function, which could allow an unauthenticated, remote attacker to cause a denial of service or execute arbitrary code.","clean_desc":"Gaim is a multi-protocol instant messenger client available for a number of operating systems. There is a buffer overflow vulnerability in the gaim_markup_extract_info_field() function. This function is used by the Yahoo Messenger (YMSG) and MSN protocol handlers. Within this function, a buffer with a fixed size of 1024 bytes is allocated in memory. When copying data, the function fails to check the size of the data copied to the buffer. This could result in a buffer overflow.","impact":"An unauthenticated, remote attacker could cause a denial of service or potentially execute arbitrary code with the privileges of the vulnerable process.","resolution":"Upgrade\nUpgrade to Gaim version 0.75 or later.","workarounds":"","sysaffected":"","thanks":"This vulnerability was publicly \nreported\n by Stefan Esser of \ne-matters","author":"This document was written by Damon Morda.","public":["http://security.e-matters.de/advisories/012004.html","http://www.debian.org/security/2004/dsa-434","http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000813","http://www.secunia.com/advisories/10705/"],"cveids":["CVE-2004-0007"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-01-26T20:09:24Z","publicdate":"2004-01-26T00:00:00Z","datefirstpublished":"2004-05-10T19:37:05Z","dateupdated":"2004-05-10T19:37:12Z","revision":12,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"7","cam_impact":"12","cam_easeofexploitation":"15","cam_attackeraccessrequired":"20","cam_scorecurrent":"11.8125","cam_scorecurrentwidelyknown":"14.175","cam_scorecurrentwidelyknownexploited":"23.625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":11.8125,"vulnote":null}