HIGH · 7.5

CVE-2004-0500

Buffer overflow in the MSN protocol plugins (1) object.c and (2) slp.c for Gaim before 0.82 allows remote attackers to cause a denial of service and possibly execute arbitrary code via MSNSLP protocol...

Vulnerability Description

Buffer overflow in the MSN protocol plugins (1) object.c and (2) slp.c for Gaim before 0.82 allows remote attackers to cause a denial of service and possibly execute arbitrary code via MSNSLP protocol messages that are not properly handled in a strncpy call.

CVSS Score

7.5

HIGH

AV:N/AC:L/Au:N/C:P/I:P/A:P
Confidentiality
PARTIAL
Integrity
PARTIAL
Availability
PARTIAL

Affected Products

VendorProductVersions
Rob FlynnGaim0.10
GentooLinux1.4
MandrakesoftMandrake Linux9.2

References

FAQ

What is CVE-2004-0500?

CVE-2004-0500 is a vulnerability with a CVSS score of 7.5 (HIGH). Buffer overflow in the MSN protocol plugins (1) object.c and (2) slp.c for Gaim before 0.82 allows remote attackers to cause a denial of service and possibly execute arbitrary code via MSNSLP protocol...

How severe is CVE-2004-0500?

CVE-2004-0500 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2004-0500?

Check the references section above for vendor advisories and patch information. Affected products include: Rob Flynn Gaim, Gentoo Linux, Mandrakesoft Mandrake Linux.