CVE-ID

CVE-2004-0006

• Severity Rating • Fix Information • Vulnerable Software Versions • SCAP Mappings
Description
Multiple buffer overflows in Gaim 0.75 and earlier, and Ultramagnetic before 0.81, allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) cookies in a Yahoo web connection, (2) a long name parameter in the Yahoo login web page, (3) a long value parameter in the Yahoo login page, (4) a YMSG packet, (5) the URL parser, and (6) HTTP proxy connect.
References
Note: References are provided for the convenience of the reader to help distinguish between vulnerabilities. The list is not intended to be complete.
Date Entry Created
20040105 Disclaimer: The entry creation date may reflect when the CVE-ID was allocated or reserved, and does not necessarily indicate when this vulnerability was discovered, shared with the affected vendor, publicly disclosed, or updated in CVE.
Phase (Legacy)
Modified (20100819)
Votes (Legacy)
ACCEPT(5) Armstrong, Baker, Cole, Cox, Green
NOOP(2) Christey, Wall
Comments (Legacy)
 Cox> Although the 0.59.1 version of Gaim shipped by Red Hat contained these
   flaws, Yahoo connections were not functional and therefore the majority of
   the issues could not be exploited, leading to the abstraction comment above.
 Christey> CERT-VN:VU#871838
   URL:http://www.kb.cert.org/vuls/id/871838
   CERT-VN:VU#444158
   URL:http://www.kb.cert.org/vuls/id/444158
   CERT-VN:VU#503030
   URL:http://www.kb.cert.org/vuls/id/503030
   CERT-VN:VU#371382
   URL:http://www.kb.cert.org/vuls/id/371382
   CERT-VN:VU#297198
   URL:http://www.kb.cert.org/vuls/id/297198
   CERT-VN:VU#527142
   URL:http://www.kb.cert.org/vuls/id/527142
 Christey> Normalize Gentoo reference

Proposed (Legacy)
20040318
This is an entry on the CVE list, which standardizes names for security problems.