CVE-2004-0007
 
Severity Score
7.5
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Buffer overflow in the Extract Info Field Function for (1) MSN and (2) YMSG protocol handlers in Gaim 0.74 and earlier, and Ultramagnetic before 0.81, allows remote attackers to cause a denial of service and possibly execute arbitrary code.
Desbordamiento de búfer en la Función Extract Info Field en los manejadores de protocolos de MSN e YMSG en Gaim 0.74 y anteriores, y Ultramagnetic anteriores a 0.81 permite a atacantes remotos causar una denegación de servicio y posiblemente ejecutar código arbitrario.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2004-01-05 CVE Reserved
- 2004-01-26 CVE Published
- 2024-02-13 EPSS Updated
- 2024-08-08 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (22)
URL | Tag | Source |
---|---|---|
http://archives.neohapsis.com/archives/fulldisclosure/2004-01/0994.html | Mailing List | |
http://marc.info/?l=bugtraq&m=107513690306318&w=2 | Mailing List | |
http://marc.info/?l=bugtraq&m=107522432613022&w=2 | Mailing List | |
http://www.kb.cert.org/vuls/id/197142 | Third Party Advisory | |
http://www.osvdb.org/3733 | Vdb Entry | |
http://www.securityfocus.com/bid/9489 | Vdb Entry | |
http://www.securitytracker.com/id?1008850 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/14946 | Vdb Entry | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A819 | Signature | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9906 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://security.e-matters.de/advisories/012004.html | 2017-10-11 | |
http://ultramagnetic.sourceforge.net/advisories/001.html | 2017-10-11 | |
http://www.debian.org/security/2004/dsa-434 | 2017-10-11 | |
http://www.redhat.com/support/errata/RHSA-2004-033.html | 2017-10-11 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Rob Flynn Search vendor "Rob Flynn" | Gaim Search vendor "Rob Flynn" for product "Gaim" | <= 0.74 Search vendor "Rob Flynn" for product "Gaim" and version " <= 0.74" | - |
Affected
| ||||||
Ultramagnetic Search vendor "Ultramagnetic" | Ultramagnetic Search vendor "Ultramagnetic" for product "Ultramagnetic" | <= 0.81 Search vendor "Ultramagnetic" for product "Ultramagnetic" and version " <= 0.81" | - |
Affected
|