CVE-2004-0005

Public Exploit

Description

Multiple buffer overflows in Gaim 0.75 allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) octal encoding in yahoo_decode that causes a null byte to be written beyond the buffer, (2) octal encoding in yahoo_decode that causes a pointer to reference memory beyond the terminating null byte, (3) a quoted printable string to the gaim_quotedp_decode MIME decoder that causes a null byte to be written beyond the buffer, and (4) quoted printable encoding in gaim_quotedp_decode that causes a pointer to reference memory beyond the terminating null byte.

Category

9.8
CVSS
Severity: Critical
CVSS 3.1 •
CVSS 2.0 •
EPSS 21.43% Top 5%
Vendor Advisory debian.org Vendor Advisory novell.com Vendor Advisory slackware.com Vendor Advisory gentoo.org Vendor Advisory com.br Vendor Advisory e-matters.de
Affected: n/a n/a
Published at:
Updated at:

References

Link Tags
https://exchange.xforce.ibmcloud.com/vulnerabilities/14944 third party advisory vdb entry
http://www.kb.cert.org/vuls/id/226974 third party advisory us government resource
http://www.debian.org/security/2004/dsa-434 patch vendor advisory broken link
https://exchange.xforce.ibmcloud.com/vulnerabilities/14942 third party advisory vdb entry
http://www.novell.com/linux/security/advisories/2004_04_gaim.html vendor advisory broken link
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.361158 patch vendor advisory mailing list
https://exchange.xforce.ibmcloud.com/vulnerabilities/14935 third party advisory vdb entry
http://marc.info/?l=bugtraq&m=107513690306318&w=2 exploit mailing list
https://security.gentoo.org/glsa/200401-04 third party advisory vendor advisory
http://www.securitytracker.com/id?1008850 broken link third party advisory vdb entry
http://security.e-matters.de/advisories/012004.html patch vendor advisory broken link
http://www.osvdb.org/3736 vdb entry broken link
http://archives.neohapsis.com/archives/fulldisclosure/2004-01/0994.html broken link mailing list
http://www.kb.cert.org/vuls/id/655974 third party advisory us government resource
http://www.kb.cert.org/vuls/id/190366 third party advisory us government resource
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000813 vendor advisory broken link
http://www.kb.cert.org/vuls/id/404470 third party advisory us government resource
https://exchange.xforce.ibmcloud.com/vulnerabilities/14938 third party advisory vdb entry

Frequently Asked Questions

What is the severity of CVE-2004-0005?
CVE-2004-0005 has been scored as a critical severity vulnerability.
How to fix CVE-2004-0005?
To fix CVE-2004-0005, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2004-0005 being actively exploited in the wild?
It is possible that CVE-2004-0005 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~21% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.