Vulnerability Details : CVE-2004-0500
Buffer overflow in the MSN protocol plugins (1) object.c and (2) slp.c for Gaim before 0.82 allows remote attackers to cause a denial of service and possibly execute arbitrary code via MSNSLP protocol messages that are not properly handled in a strncpy call.
Vulnerability category: OverflowExecute codeDenial of service
Products affected by CVE-2004-0500
- cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*
- cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*
- cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.10.3:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.10:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.57:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.51:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.52:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.53:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.54:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.56:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.55:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.59:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.58:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.75:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.50:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.64:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.65:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.73:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.74:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.60:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.61:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.68:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.69:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.70:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.62:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.63:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.71:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.72:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.59.1:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.66:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.67:*:*:*:*:*:*:*
- cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2004-0500
9.17%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2004-0500
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2004-0500
-
http://gaim.sourceforge.net/security/?id=0
-
http://www.gentoo.org/security/en/glsa/glsa-200408-12.xml
Patch;Vendor Advisory
-
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:081
-
http://www.fedoranews.org/updates/FEDORA-2004-278.shtml
-
http://www.redhat.com/support/errata/RHSA-2004-400.html
-
http://www.novell.com/linux/security/advisories/2004_25_gaim.html
-
http://www.gentoo.org/security/en/glsa/glsa-200408-27.xml
-
http://www.fedoranews.org/updates/FEDORA-2004-279.shtml
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9429
-
http://www.securityfocus.com/bid/10865
Patch;Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/16920
Jump to