Overview
There is a buffer overflow vulnerability in the Gaim gaim_url_parse() function, which could allow an unauthenticated, remote attacker to execute arbitrary code.
Description
| Gaim is a multi-protocol instant messenger available for a number of operating systems. There is a buffer overflow vulnerability in the gaim_url_parse() function. This function is responsible for splitting a URL into parts. By supplying an overly long URL to this function, an unauthenticated, remote attacker could potentially execute arbitrary code. | 
Impact
| An unauthenticated, remote attacker could potentially execute arbitrary code with the privileges of the vulnerable process. | 
Solution
| Upgrade Upgrade to Gaim version 0.76 or later. | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental | 
References
Acknowledgements
This vulnerability was publicly reported by Stefan Esser of e-matters.
This document was written by Damon Morda.
Other Information
| CVE IDs: | CVE-2004-0006 | 
| Severity Metric: | 11.81 | 
| Date Public: | 2004-01-26 | 
| Date First Published: | 2004-05-06 | 
| Date Last Updated: | 2004-05-06 19:47 UTC | 
| Document Revision: | 9 |