{"vuid":"VU#297198","idnumber":"297198","name":"Gaim fails to properly validate the \"value\" parameter in the Yahoo login webpage","keywords":["Gaim","buffer overflow","Yahoo Messenger","yahoo_login_page_hash()","YMSG protocol","value parameter"],"overview":"There is a buffer overflow vulnerability in the way the Gaim yahoo_login_page_hash() function parses the \"value\" parameter in the Yahoo login webpage.","clean_desc":"Gaim is a multi-protocol instant messenger available for a number of operating systems. It supports a variety of instant messaging protocols, including the Yahoo Messenger (YMSG) protocol. There is a buffer overflow vulnerability in the yahoo_login_page_hash() function of Gaim's YMSG protocol. When parsing  the Yahoo login webpage, the yahoo_login_page_hash() function fails to perform proper bounds checking on the \"value\" parameter. Although the source of these values should originate from a site controlled by Yahoo, an attacker may use several techniques (DNS spoofing, man-in-the-middle, etc.) to modify the values returned to the victim.","impact":"An attacker with the ability to control the \"value\" parameter returned to the victim could execute arbitrary code with the privileges of the vulnerable process.","resolution":"Upgrade\nUpgrade to Gaim version 0.76 or later.","workarounds":"","sysaffected":"","thanks":"This vulnerability was publicly \nreported\n by Stefan Esser of \ne-matters","author":"This document was written by Damon Morda.","public":["http://security.e-matters.de/advisories/012004.html","http://www.debian.org/security/2004/dsa-434","http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000813","http://www.secunia.com/advisories/10705/"],"cveids":["CVE-2004-0006"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-01-26T19:47:49Z","publicdate":"2004-01-26T00:00:00Z","datefirstpublished":"2004-05-06T19:46:14Z","dateupdated":"2004-05-06T19:46:21Z","revision":14,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"7","cam_impact":"10","cam_easeofexploitation":"10","cam_attackeraccessrequired":"20","cam_scorecurrent":"6.5625","cam_scorecurrentwidelyknown":"7.875","cam_scorecurrentwidelyknownexploited":"13.125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":6.5625,"vulnote":null}