cvelist/2004/0xxx/CVE-2004-0006.json

228 lines
7.6 KiB
JSON

{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2004-0006",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Multiple buffer overflows in Gaim 0.75 and earlier, and Ultramagnetic before 0.81, allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) cookies in a Yahoo web connection, (2) a long name parameter in the Yahoo login web page, (3) a long value parameter in the Yahoo login page, (4) a YMSG packet, (5) the URL parser, and (6) HTTP proxy connect."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "20040126 Advisory 01/2004: 12 x Gaim remote overflows",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=107513690306318&w=2"
},
{
"name" : "20040126 Advisory 01/2004: 12 x Gaim remote overflows",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2004-01/0994.html"
},
{
"name" : "http://security.e-matters.de/advisories/012004.html",
"refsource" : "MISC",
"url" : "http://security.e-matters.de/advisories/012004.html"
},
{
"name" : "20040127 Ultramagnetic Advisory #001: Multiple vulnerabilities in Gaim code",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=107522432613022&w=2"
},
{
"name" : "http://ultramagnetic.sourceforge.net/advisories/001.html",
"refsource" : "CONFIRM",
"url" : "http://ultramagnetic.sourceforge.net/advisories/001.html"
},
{
"name" : "RHSA-2004:032",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2004-032.html"
},
{
"name" : "RHSA-2004:033",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2004-033.html"
},
{
"name" : "RHSA-2004:045",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2004-045.html"
},
{
"name" : "MDKSA-2004:006",
"refsource" : "MANDRAKE",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2004:006"
},
{
"name" : "20040202-01-U",
"refsource" : "SGI",
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20040202-01-U.asc"
},
{
"name" : "SuSE-SA:2004:004",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2004_04_gaim.html"
},
{
"name" : "DSA-434",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2004/dsa-434"
},
{
"name" : "CLA-2004:813",
"refsource" : "CONECTIVA",
"url" : "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000813"
},
{
"name" : "20040201-01-U",
"refsource" : "SGI",
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20040201-01-U.asc"
},
{
"name" : "SSA:2004-026",
"refsource" : "SLACKWARE",
"url" : "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.361158"
},
{
"name" : "GLSA-200401-04",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200401-04.xml"
},
{
"name" : "VU#297198",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/297198"
},
{
"name" : "VU#371382",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/371382"
},
{
"name" : "VU#444158",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/444158"
},
{
"name" : "VU#503030",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/503030"
},
{
"name" : "VU#527142",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/527142"
},
{
"name" : "VU#871838",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/871838"
},
{
"name" : "9489",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/9489"
},
{
"name" : "3731",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/3731"
},
{
"name" : "3732",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/3732"
},
{
"name" : "oval:org.mitre.oval:def:818",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A818"
},
{
"name" : "oval:org.mitre.oval:def:10222",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10222"
},
{
"name" : "1008850",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1008850"
},
{
"name" : "gaim-http-proxy-bo(14947)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/14947"
},
{
"name" : "gaim-login-name-bo(14940)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/14940"
},
{
"name" : "gaim-login-value-bo(14941)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/14941"
},
{
"name" : "gaim-urlparser-bo(14945)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/14945"
},
{
"name" : "gaim-yahoopacketread-keyname-bo(14943)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/14943"
},
{
"name" : "gaim-yahoowebpending-cookie-bo(14939)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/14939"
}
]
}
}