{"vuid":"VU#503030","idnumber":"503030","name":"Gaim fails to properly parse cookies in Yahoo web connections","keywords":["Gaim","buffer overflow","Yahoo web connection","yahoo_web_pending() function"],"overview":"There is a buffer overflow vulnerability in the way Gaim parses cookies for Yahoo web connections.","clean_desc":"Gaim is a multi-protocol instant messenger available for a number of operating systems. It supports a variety of instant messaging protocols, including the Yahoo Messenger (YMSG) protocol. There is a buffer overflow vulnerability in the yahoo_web_pending() function. This function is responsible for parsing cookies in HTTP reply headers for Yahoo web connections. When parsing the HTTP reply header, the first 1024 bytes of cookie data is copied into a 256 byte buffer without performing adequate bounds checking.","impact":"An unauthenticated, remote attacker could potentially execute arbitrary code with the privileges of the vulnerable process.","resolution":"Upgrade\nUpgrade to Gaim version 0.76 or later.","workarounds":"","sysaffected":"","thanks":"This vulnerability was \nreported\n by Stefan Esser of \ne-matters","author":"This document was written by Damon Morda.","public":["http://security.e-matters.de/advisories/012004.html","http://www.debian.org/security/2004/dsa-434","http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000813","http://www.secunia.com/advisories/10705/"],"cveids":["CVE-2004-0006"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-01-26T19:40:20Z","publicdate":"2004-01-26T00:00:00Z","datefirstpublished":"2004-05-06T19:46:46Z","dateupdated":"2004-05-06T19:47:04Z","revision":12,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"10","cam_impact":"7","cam_easeofexploitation":"10","cam_attackeraccessrequired":"20","cam_scorecurrent":"5.25","cam_scorecurrentwidelyknown":"6.5625","cam_scorecurrentwidelyknownexploited":"11.8125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":5.25,"vulnote":null}