Vulnerability Details : CVE-2005-2103
Buffer overflow in the AIM and ICQ module in Gaim before 1.5.0 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an away message with a large number of AIM substitution strings, such as %t or %n.
Vulnerability category: OverflowExecute codeDenial of service
Products affected by CVE-2005-2103
- cpe:2.3:a:gaim_project:gaim:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2005-2103
17.50%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2005-2103
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2025-01-16 |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST | 2024-02-02 |
CWE ids for CVE-2005-2103
-
The product does not correctly calculate the size to be used when allocating a buffer, which could lead to a buffer overflow.Assigned by:
- 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2005-2103
-
http://www.redhat.com/support/errata/RHSA-2005-627.html
SupportBroken Link
-
http://www.securityfocus.com/archive/1/426078/100/0/threaded
Broken Link;Third Party Advisory;VDB Entry
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11477
404 Not FoundBroken Link
-
http://www.novell.com/linux/security/advisories/2005_19_sr.html
Security - Support | SUSEBroken Link
-
https://usn.ubuntu.com/168-1/
Broken Link
-
http://gaim.sourceforge.net/security/?id=22
Encountered a 404 errorBroken Link
-
http://www.redhat.com/support/errata/RHSA-2005-589.html
SupportBroken Link
-
http://www.securityfocus.com/bid/14531
Broken Link;Third Party Advisory;VDB Entry
Jump to