Vulnerability Details : CVE-2002-0384
Buffer overflow in Jabber plug-in for Gaim client before 0.58 allows remote attackers to execute arbitrary code.
Vulnerability category: OverflowExecute code
Products affected by CVE-2002-0384
- cpe:2.3:a:rob_flynn:gaim:0.57:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.51:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.52:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.53:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.54:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.56:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.55:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2002-0384
9.67%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2002-0384
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2002-0384
-
http://online.securityfocus.com/advisories/4358
-
http://www.securityfocus.com/bid/5406
Patch;Vendor Advisory
-
http://www.redhat.com/support/errata/RHSA-2003-156.html
-
http://www.redhat.com/support/errata/RHSA-2002-107.html
-
http://www.iss.net/security_center/static/9766.php
Vendor Advisory
-
http://www.redhat.com/support/errata/RHSA-2002-098.html
Patch;Vendor Advisory
-
http://www.redhat.com/support/errata/RHSA-2002-122.html
-
http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:054
Jump to