Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2004-0500

Опубликовано: 28 сент. 2004
Источник: debian
EPSS Низкий

Описание

Buffer overflow in the MSN protocol plugins (1) object.c and (2) slp.c for Gaim before 0.82 allows remote attackers to cause a denial of service and possibly execute arbitrary code via MSNSLP protocol messages that are not properly handled in a strncpy call.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gaimfixed1:0.81-3package

EPSS

Процентиль: 87%
0.03264
Низкий

Связанные уязвимости

ubuntu
больше 20 лет назад

Buffer overflow in the MSN protocol plugins (1) object.c and (2) slp.c for Gaim before 0.82 allows remote attackers to cause a denial of service and possibly execute arbitrary code via MSNSLP protocol messages that are not properly handled in a strncpy call.

redhat
почти 21 год назад

Buffer overflow in the MSN protocol plugins (1) object.c and (2) slp.c for Gaim before 0.82 allows remote attackers to cause a denial of service and possibly execute arbitrary code via MSNSLP protocol messages that are not properly handled in a strncpy call.

nvd
больше 20 лет назад

Buffer overflow in the MSN protocol plugins (1) object.c and (2) slp.c for Gaim before 0.82 allows remote attackers to cause a denial of service and possibly execute arbitrary code via MSNSLP protocol messages that are not properly handled in a strncpy call.

github
около 3 лет назад

Buffer overflow in the MSN protocol plugins (1) object.c and (2) slp.c for Gaim before 0.82 allows remote attackers to cause a denial of service and possibly execute arbitrary code via MSNSLP protocol messages that are not properly handled in a strncpy call.

EPSS

Процентиль: 87%
0.03264
Низкий