{ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2004-0006", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "n/a", "version" : { "version_data" : [ { "version_value" : "n/a" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "Multiple buffer overflows in Gaim 0.75 and earlier, and Ultramagnetic before 0.81, allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) cookies in a Yahoo web connection, (2) a long name parameter in the Yahoo login web page, (3) a long value parameter in the Yahoo login page, (4) a YMSG packet, (5) the URL parser, and (6) HTTP proxy connect." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "n/a" } ] } ] }, "references" : { "reference_data" : [ { "name" : "20040126 Advisory 01/2004: 12 x Gaim remote overflows", "refsource" : "BUGTRAQ", "url" : "http://marc.info/?l=bugtraq&m=107513690306318&w=2" }, { "name" : "20040126 Advisory 01/2004: 12 x Gaim remote overflows", "refsource" : "FULLDISC", "url" : "http://archives.neohapsis.com/archives/fulldisclosure/2004-01/0994.html" }, { "name" : "http://security.e-matters.de/advisories/012004.html", "refsource" : "MISC", "url" : "http://security.e-matters.de/advisories/012004.html" }, { "name" : "20040127 Ultramagnetic Advisory #001: Multiple vulnerabilities in Gaim code", "refsource" : "BUGTRAQ", "url" : "http://marc.info/?l=bugtraq&m=107522432613022&w=2" }, { "name" : "http://ultramagnetic.sourceforge.net/advisories/001.html", "refsource" : "CONFIRM", "url" : "http://ultramagnetic.sourceforge.net/advisories/001.html" }, { "name" : "RHSA-2004:032", "refsource" : "REDHAT", "url" : "http://www.redhat.com/support/errata/RHSA-2004-032.html" }, { "name" : "RHSA-2004:033", "refsource" : "REDHAT", "url" : "http://www.redhat.com/support/errata/RHSA-2004-033.html" }, { "name" : "RHSA-2004:045", "refsource" : "REDHAT", "url" : "http://www.redhat.com/support/errata/RHSA-2004-045.html" }, { "name" : "MDKSA-2004:006", "refsource" : "MANDRAKE", "url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2004:006" }, { "name" : "20040202-01-U", "refsource" : "SGI", "url" : "ftp://patches.sgi.com/support/free/security/advisories/20040202-01-U.asc" }, { "name" : "SuSE-SA:2004:004", "refsource" : "SUSE", "url" : "http://www.novell.com/linux/security/advisories/2004_04_gaim.html" }, { "name" : "DSA-434", "refsource" : "DEBIAN", "url" : "http://www.debian.org/security/2004/dsa-434" }, { "name" : "CLA-2004:813", "refsource" : "CONECTIVA", "url" : "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000813" }, { "name" : "20040201-01-U", "refsource" : "SGI", "url" : "ftp://patches.sgi.com/support/free/security/advisories/20040201-01-U.asc" }, { "name" : "SSA:2004-026", "refsource" : "SLACKWARE", "url" : "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.361158" }, { "name" : "GLSA-200401-04", "refsource" : "GENTOO", "url" : "http://security.gentoo.org/glsa/glsa-200401-04.xml" }, { "name" : "VU#297198", "refsource" : "CERT-VN", "url" : "http://www.kb.cert.org/vuls/id/297198" }, { "name" : "VU#371382", "refsource" : "CERT-VN", "url" : "http://www.kb.cert.org/vuls/id/371382" }, { "name" : "VU#444158", "refsource" : "CERT-VN", "url" : "http://www.kb.cert.org/vuls/id/444158" }, { "name" : "VU#503030", "refsource" : "CERT-VN", "url" : "http://www.kb.cert.org/vuls/id/503030" }, { "name" : "VU#527142", "refsource" : "CERT-VN", "url" : "http://www.kb.cert.org/vuls/id/527142" }, { "name" : "VU#871838", "refsource" : "CERT-VN", "url" : "http://www.kb.cert.org/vuls/id/871838" }, { "name" : "9489", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/9489" }, { "name" : "3731", "refsource" : "OSVDB", "url" : "http://www.osvdb.org/3731" }, { "name" : "3732", "refsource" : "OSVDB", "url" : "http://www.osvdb.org/3732" }, { "name" : "oval:org.mitre.oval:def:818", "refsource" : "OVAL", "url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A818" }, { "name" : "oval:org.mitre.oval:def:10222", "refsource" : "OVAL", "url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10222" }, { "name" : "1008850", "refsource" : "SECTRACK", "url" : "http://www.securitytracker.com/id?1008850" }, { "name" : "gaim-http-proxy-bo(14947)", "refsource" : "XF", "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/14947" }, { "name" : "gaim-login-name-bo(14940)", "refsource" : "XF", "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/14940" }, { "name" : "gaim-login-value-bo(14941)", "refsource" : "XF", "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/14941" }, { "name" : "gaim-urlparser-bo(14945)", "refsource" : "XF", "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/14945" }, { "name" : "gaim-yahoopacketread-keyname-bo(14943)", "refsource" : "XF", "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/14943" }, { "name" : "gaim-yahoowebpending-cookie-bo(14939)", "refsource" : "XF", "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/14939" } ] } }