Overview
There is a buffer overflow vulnerability in the gaim_markup_extract_info_field() function, which could allow an unauthenticated, remote attacker to cause a denial of service or execute arbitrary code.
Description
| Gaim is a multi-protocol instant messenger client available for a number of operating systems. There is a buffer overflow vulnerability in the gaim_markup_extract_info_field() function. This function is used by the Yahoo Messenger (YMSG) and MSN protocol handlers. Within this function, a buffer with a fixed size of 1024 bytes is allocated in memory. When copying data, the function fails to check the size of the data copied to the buffer. This could result in a buffer overflow. | 
Impact
| An unauthenticated, remote attacker could cause a denial of service or potentially execute arbitrary code with the privileges of the vulnerable process. | 
Solution
| Upgrade Upgrade to Gaim version 0.75 or later. | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental | 
References
Acknowledgements
This vulnerability was publicly reported by Stefan Esser of e-matters.
This document was written by Damon Morda.
Other Information
| CVE IDs: | CVE-2004-0007 | 
| Severity Metric: | 11.81 | 
| Date Public: | 2004-01-26 | 
| Date First Published: | 2004-05-10 | 
| Date Last Updated: | 2004-05-10 19:37 UTC | 
| Document Revision: | 12 |