FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

gaim remotely exploitable vulnerabilities in MSN component

Affected packages
gaim < 0.81_1
ja-gaim < 0.81_1
ko-gaim < 0.81_1
ru-gaim < 0.81_1
20030000 <= gaim

Details

VuXML ID 5b8f9a02-ec93-11d8-b913-000c41e2cdad
Discovery 2004-08-12
Entry 2004-08-12
Modified 2004-10-25

Sebastian Krahmer discovered several remotely exploitable buffer overflow vulnerabilities in the MSN component of gaim.

In two places in the MSN protocol plugins (object.c and slp.c), strncpy was used incorrectly; the size of the array was not checked before copying to it. Both bugs affect MSN's MSNSLP protocol, which is peer-to-peer, so this could potentially be easy to exploit.

References

CVE Name CVE-2004-0500
URL http://gaim.sourceforge.net/security/?id=0