Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2004-0006

Опубликовано: 03 мар. 2004
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 7.5

Описание

Multiple buffer overflows in Gaim 0.75 and earlier, and Ultramagnetic before 0.81, allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) cookies in a Yahoo web connection, (2) a long name parameter in the Yahoo login web page, (3) a long value parameter in the Yahoo login page, (4) a YMSG packet, (5) the URL parser, and (6) HTTP proxy connect.

РелизСтатусПримечание
dapper

released

1.5.0+1.5.1cvs20051015-1ubuntu10
devel

DNE

edgy

released

1.5.0+1.5.1cvs20051015-1ubuntu10
feisty

released

1.5.0+1.5.1cvs20051015-1ubuntu10
upstream

needs-triage

Показывать по

Ссылки на источники

EPSS

Процентиль: 95%
0.17269
Средний

7.5 High

CVSS2

Связанные уязвимости

redhat
больше 21 года назад

Multiple buffer overflows in Gaim 0.75 and earlier, and Ultramagnetic before 0.81, allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) cookies in a Yahoo web connection, (2) a long name parameter in the Yahoo login web page, (3) a long value parameter in the Yahoo login page, (4) a YMSG packet, (5) the URL parser, and (6) HTTP proxy connect.

nvd
больше 21 года назад

Multiple buffer overflows in Gaim 0.75 and earlier, and Ultramagnetic before 0.81, allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) cookies in a Yahoo web connection, (2) a long name parameter in the Yahoo login web page, (3) a long value parameter in the Yahoo login page, (4) a YMSG packet, (5) the URL parser, and (6) HTTP proxy connect.

debian
больше 21 года назад

Multiple buffer overflows in Gaim 0.75 and earlier, and Ultramagnetic ...

github
больше 3 лет назад

Multiple buffer overflows in Gaim 0.75 and earlier, and Ultramagnetic before 0.81, allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) cookies in a Yahoo web connection, (2) a long name parameter in the Yahoo login web page, (3) a long value parameter in the Yahoo login page, (4) a YMSG packet, (5) the URL parser, and (6) HTTP proxy connect.

EPSS

Процентиль: 95%
0.17269
Средний

7.5 High

CVSS2

Уязвимость CVE-2004-0006