Gaim < 0.59.1 Remote Command Execution

medium Nessus Network Monitor Plugin ID 2162

Synopsis

The remote host is vulnerable to a buffer overflow.

Description

The remote host seems to be running Gaim, a popular open-source multi-protocol instant messenger. It is reported that this version of Gaim is prone to a remote command execution issue. An attacker may send malicious code encoded in hyperlinks in instant messages that will be executed by the remote host.

Solution

Upgrade to version 0.59.1 or higher.

Plugin Details

Severity: Medium

ID: 2162

Published: 8/26/2004

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

CVSS v2

Risk Factor: Medium

Base Score: 5.1

Temporal Score: 4.4

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5.6

Temporal Score: 5.4

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:rob_flynn:gaim

Reference Information

CVE: CVE-2002-0384, CVE-2002-0989

BID: 5574, 5406