Page 5 of 28 results (0.021 seconds)

CVSS: 9.8EPSS: 42%CPEs: 1EXPL: 1

Multiple buffer overflows in Gaim 0.75 allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) octal encoding in yahoo_decode that causes a null byte to be written beyond the buffer, (2) octal encoding in yahoo_decode that causes a pointer to reference memory beyond the terminating null byte, (3) a quoted printable string to the gaim_quotedp_decode MIME decoder that causes a null byte to be written beyond the buffer, and (4) quoted printable encoding in gaim_quotedp_decode that causes a pointer to reference memory beyond the terminating null byte. Múltiples desbordamientos de búfer en Gaim 0.75 pemite a atacantes remotos causar una denegación de servicio y posiblemente ejecutar código arbitrario mediante codificación octal en yahoo_decode que causa que un byte nulo sea escrito más allá del búfer, codificación octal en yahoo_decode que causa que un puntero referencie memoria más allá del byte nulo de terminación, una cadena imprimible entrecomillada pasada al decodificador MIME gaim_quotedp_decode que hace que un byte nulo sea escrito más allá del búfer, y codificación imprimible entrecomillada en gaim_quotedp_decode que causa que un puntero referencie memora más allá del byte nulo de terminación. • http://archives.neohapsis.com/archives/fulldisclosure/2004-01/0994.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000813 http://marc.info/?l=bugtraq&m=107513690306318&w=2 http://security.e-matters.de/advisories/012004.html http://www.debian.org/security/2004/dsa-434 http://www.kb.cert.org/vuls/id/190366 http://www.kb.cert.org/vuls/id/226974 http://www.kb.cert.org/vuls/id/404470 http://www.kb.cert.org/vuls/id/655974 http://www.novell • CWE-193: Off-by-one Error •

CVSS: 7.5EPSS: 32%CPEs: 2EXPL: 0

Buffer overflow in the Extract Info Field Function for (1) MSN and (2) YMSG protocol handlers in Gaim 0.74 and earlier, and Ultramagnetic before 0.81, allows remote attackers to cause a denial of service and possibly execute arbitrary code. Desbordamiento de búfer en la Función Extract Info Field en los manejadores de protocolos de MSN e YMSG en Gaim 0.74 y anteriores, y Ultramagnetic anteriores a 0.81 permite a atacantes remotos causar una denegación de servicio y posiblemente ejecutar código arbitrario. • http://archives.neohapsis.com/archives/fulldisclosure/2004-01/0994.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000813 http://marc.info/?l=bugtraq&m=107513690306318&w=2 http://marc.info/?l=bugtraq&m=107522432613022&w=2 http://security.e-matters.de/advisories/012004.html http://security.gentoo.org/glsa/glsa-200401-04.xml http://ultramagnetic.sourceforge.net/advisories/001.html http://www.debian.org/security/2004/dsa-434 http://www.kb.cert.org/vuls/id •

CVSS: 7.5EPSS: 20%CPEs: 2EXPL: 0

Multiple buffer overflows in Gaim 0.75 and earlier, and Ultramagnetic before 0.81, allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) cookies in a Yahoo web connection, (2) a long name parameter in the Yahoo login web page, (3) a long value parameter in the Yahoo login page, (4) a YMSG packet, (5) the URL parser, and (6) HTTP proxy connect. Múltiples desbordamientos de búfer en Gaim 0.75 y anteriores, y Ultramagnetic anteriores a de 0.81, permite a atacantes remotos causar una denegación de servicio y posiblemente ejecutar código arbitrario. • ftp://patches.sgi.com/support/free/security/advisories/20040201-01-U.asc ftp://patches.sgi.com/support/free/security/advisories/20040202-01-U.asc http://archives.neohapsis.com/archives/fulldisclosure/2004-01/0994.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000813 http://marc.info/?l=bugtraq&m=107513690306318&w=2 http://marc.info/?l=bugtraq&m=107522432613022&w=2 http://security.e-matters.de/advisories/012004.html http://security.gentoo.org/glsa/glsa-200401- •

CVSS: 7.5EPSS: 25%CPEs: 2EXPL: 0

Integer overflow in Gaim 0.74 and earlier, and Ultramagnetic before 0.81, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a directIM packet that triggers a heap-based buffer overflow. Desbordamiento de enteros en Gaim 0.74 y anteriores, y Ultramagnetic anteriores a 0.81 permite a atacantes remotos causar una denegación de servicio. • ftp://patches.sgi.com/support/free/security/advisories/20040201-01-U.asc ftp://patches.sgi.com/support/free/security/advisories/20040202-01-U.asc http://archives.neohapsis.com/archives/fulldisclosure/2004-01/0994.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000813 http://marc.info/?l=bugtraq&m=107513690306318&w=2 http://marc.info/?l=bugtraq&m=107522338611564&w=2 http://marc.info/?l=bugtraq&m=107522432613022&w=2 http://security.e-matters.de/advisories/01 •

CVSS: 7.5EPSS: 12%CPEs: 7EXPL: 0

Buffer overflow in Jabber plug-in for Gaim client before 0.58 allows remote attackers to execute arbitrary code. Desbordamiento de búfer en el plug-in Jabber en el cliente Gaim anteriores a 0.589 permite a atacantes ejecutar código arbitrario. • http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:054 http://online.securityfocus.com/advisories/4358 http://www.iss.net/security_center/static/9766.php http://www.osvdb.org/3729 http://www.redhat.com/support/errata/RHSA-2002-098.html http://www.redhat.com/support/errata/RHSA-2002-107.html http://www.redhat.com/support/errata/RHSA-2002-122.html http://www.redhat.com/support/errata/RHSA-2003-156.html http://www.securityfocus.com/bid/5406 https://access •