CVE List

Id CVE No. Status Description Phase Votes Comments Actions
8433  CVE-2004-0005  Candidate  Multiple buffer overflows in Gaim 0.75 allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) octal encoding in yahoo_decode that causes a null byte to be written beyond the buffer, (2) octal encoding in yahoo_decode that causes a pointer to reference memory beyond the terminating null byte, (3) a quoted printable string to the gaim_quotedp_decode MIME decoder that causes a null byte to be written beyond the buffer, and (4) quoted printable encoding in gaim_quotedp_decode that causes a pointer to reference memory beyond the terminating null byte.  Modified (20071113)  ACCEPT(5) Armstrong, Baker, Cole, Cox, Green | NOOP(2) Christey, Wall  Christey> CERT-VN:VU#404470 | URL:http://www.kb.cert.org/vuls/id/404470 | CERT-VN:VU#655974 | URL:http://www.kb.cert.org/vuls/id/655974 | CERT-VN:VU#226974 | URL:http://www.kb.cert.org/vuls/id/226974 | CERT-VN:VU#190366 | URL:http://www.kb.cert.org/vuls/id/190366  View
8434  CVE-2004-0006  Candidate  Multiple buffer overflows in Gaim 0.75 and earlier, and Ultramagnetic before 0.81, allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) cookies in a Yahoo web connection, (2) a long name parameter in the Yahoo login web page, (3) a long value parameter in the Yahoo login page, (4) a YMSG packet, (5) the URL parser, and (6) HTTP proxy connect.  Modified (20100819)  ACCEPT(5) Armstrong, Baker, Cole, Cox, Green | NOOP(2) Christey, Wall  Cox> Although the 0.59.1 version of Gaim shipped by Red Hat contained these | flaws, Yahoo connections were not functional and therefore the majority of | the issues could not be exploited, leading to the abstraction comment above. | Christey> CERT-VN:VU#871838 | URL:http://www.kb.cert.org/vuls/id/871838 | CERT-VN:VU#444158 | URL:http://www.kb.cert.org/vuls/id/444158 | CERT-VN:VU#503030 | URL:http://www.kb.cert.org/vuls/id/503030 | CERT-VN:VU#371382 | URL:http://www.kb.cert.org/vuls/id/371382 | CERT-VN:VU#297198 | URL:http://www.kb.cert.org/vuls/id/297198 | CERT-VN:VU#527142 | URL:http://www.kb.cert.org/vuls/id/527142 | Christey> Normalize Gentoo reference  View
8435  CVE-2004-0007  Candidate  Buffer overflow in the Extract Info Field Function for (1) MSN and (2) YMSG protocol handlers in Gaim 0.74 and earlier, and Ultramagnetic before 0.81, allows remote attackers to cause a denial of service and possibly execute arbitrary code.  Modified (20100819)  ACCEPT(5) Armstrong, Baker, Cole, Cox, Green | NOOP(2) Christey, Wall  Christey> Normalize Gentoo, Slackware reference | Christey> CERT-VN:VU#197142  View
2771  CVE-2000-1204  Candidate  Vulnerability in the mod_vhost_alias virtual hosting module for Apache 1.3.9, 1.3.11 and 1.3.12 allows remote attackers to obtain the source code for CGI programs if the cgi-bin directory is under the document root.  Proposed (20020830)  ACCEPT(5) Armstrong, Baker, Cole, Cox, Green | MODIFY(1) Frech | NOOP(2) Foat, Wall  Frech> XF:apache-modvhostalias-source-disclosure(11088)  View
5107  CVE-2002-0717  Candidate  PHP 4.2.0 and 4.2.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via an HTTP POST request with certain arguments in a multipart/form-data form, which generates an error condition that is not properly handled and causes improper memory to be freed.  Proposed (20020726)  ACCEPT(5) Armstrong, Baker, Cole, Cox, Frech | NOOP(2) Christey, Foat | REVIEWING(1) Wall  Christey> BID:5278 | URL:http://www.securityfocus.com/bid/5278 | HP:HPSBUX0208-207 | URL:http://online.securityfocus.com/advisories/4362  View

Page 19889 of 20943, showing 5 records out of 104715 total, starting on record 99441, ending on 99445

Actions