{"vuid":"VU#404470","idnumber":"404470","name":"Gaim contains an off-by-one buffer overflow vulnerability in the yahoo_decode() function","keywords":["Gaim","Yahoo Messenger","off-by-one buffer overflow","Yahoo","yahoo_decode()","null byte"],"overview":"There is an off-by-one buffer overflow vulnerability in the Gaim yahoo_decode() function.","clean_desc":"Gaim is a multi-protocol instant messenger available for a number of operating systems. It supports a variety of instant messaging protocols, including the Yahoo Messenger (YMSG) protocol. There is an off-by-one buffer overflow vulnerability in the yahoo_decode() function. This function fails to properly decode octal values used for email notification functions. By supplying a specially crafted octal value, an unauthenticated, remote attacker may be able to cause a null byte to be overwritten.","impact":"An unauthenticated, remote attacker may cause a denial of service or potentially execute code of the attacker's choice.","resolution":"Upgrade\nUpgrade to Gaim version 0.76 or later. Apply a patch\nThe maintainers of Gaim have supplied a patch to address this vulnerability.","workarounds":"","sysaffected":"","thanks":"This vulnerability was publicly \nreported\n by Stefan Esser of \ne-matters","author":"This document was written by Damon Morda.","public":["http://security.e-matters.de/advisories/012004.html","http://gaim.sourceforge.net/gaim-0.75.patch","http://www.debian.org/security/2004/dsa-434","http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000813","http://www.secunia.com/advisories/10705/"],"cveids":["CVE-2004-0005"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-01-26T19:28:59Z","publicdate":"2004-01-26T00:00:00Z","datefirstpublished":"2004-04-30T17:50:35Z","dateupdated":"2004-05-06T18:20:54Z","revision":21,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"10","cam_impact":"7","cam_easeofexploitation":"15","cam_attackeraccessrequired":"20","cam_scorecurrent":"7.875","cam_scorecurrentwidelyknown":"9.84375","cam_scorecurrentwidelyknownexploited":"17.71875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":7.875,"vulnote":null}