Description
Buffer overflow in the MSN protocol handler for gaim 0.79 to 1.0.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an "unexpected sequence of MSNSLP messages" that results in an unbounded copy operation that writes to the wrong buffer.
CVSS Metrics
- Vector
- AV:N/AC:L/Au:N/C:C/I:C/A:C
- Access Vector
- network
- Access Cmplx
- low
- Auth
- none
- Confidentiality
- complete
- Integrity
- complete
- Availability
- complete
- Weaknesses
- NVD-CWE-Other
Metadata
- Primary Vendor
- ROB_FLYNN
- Published
- 1/27/2005
- Last Modified
- 4/3/2025
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
rob_flynn : gaimrob_flynn : gaimrob_flynn : gaimrob_flynn : gaimrob_flynn : gaimrob_flynn : gaimrob_flynn : gaimrob_flynn : gaimrob_flynn : gaimrob_flynn : gaimrob_flynn : gaimrob_flynn : gaimrob_flynn : gaimrob_flynn : gaimrob_flynn : gaimrob_flynn : gaimrob_flynn : gaimrob_flynn : gaimrob_flynn : gaimrob_flynn : gaimrob_flynn : gaimrob_flynn : gaimrob_flynn : gaimrob_flynn : gaimrob_flynn : gaimrob_flynn : gaimrob_flynn : gaimrob_flynn : gaimrob_flynn : gaimrob_flynn : gaimrob_flynn : gaimrob_flynn : gaimrob_flynn : gaimrob_flynn : gaimgentoo : linuxgentoo : linuxslackware : slackware_linuxslackware : slackware_linuxslackware : slackware_linuxslackware : slackware_linuxubuntu : ubuntu_linuxubuntu : ubuntu_linux
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.