Gaim < 0.59.1 Remote Command Execution

Medium Nessus Network Monitor Plugin ID 2162

Synopsis

The remote host is vulnerable to a buffer overflow.

Description

The remote host seems to be running Gaim, a popular open-source multi-protocol instant messenger. It is reported that this version of Gaim is prone to a remote command execution issue. An attacker may send malicious code encoded in hyperlinks in instant messages that will be executed by the remote host.

Solution

Upgrade to version 0.59.1 or higher.

Plugin Details

Severity: Medium

ID: 2162

File Name: 2162.prm

Published: 2004/08/26

Modified: 2016/02/05

Dependencies: 2655

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 5.1

Temporal Score: 4.4

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

CVSSv3

Base Score: 5.6

Temporal Score: 5.3

Vector: CVSS3#AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS3#E:H/RL:O/RC:C

Reference Information

CVE: CVE-2002-0384, CVE-2002-0989

BID: 5574, 5406

OSVDB: 3729, 5033