Gaim < 0.82 MSN Protocol Buffer Overflow

medium Nessus Network Monitor Plugin ID 2160

Synopsis

The remote host is vulnerable to a buffer overflow.

Description

The remote host appears to be running Gaim, a popular open-source multi-protocol instant messenger. It is reported that this version of Gaim is prone to several buffer overflows in the MSN protocol implementation. This vulnerability may permit an attacker to execute arbitrary code on the remote computer.

Solution

Upgrade to Gaim 0.82.0 or higher or disable the MSN protocol module.

Plugin Details

Severity: Medium

ID: 2160

Published: 8/26/2004

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 4.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:rob_flynn:gaim

Reference Information

CVE: CVE-2004-0500, CVE-2004-0754, CVE-2004-0785, CVE-2004-2589

BID: 11056, 10865