Gaim < 1.1.4 Remote DoS

medium Nessus Network Monitor Plugin ID 2654

Synopsis

The remote host is vulnerable to a Denial of Service (DoS) attack.

Description

The remote host appears to be running Gaim, a popular open-source multi-protocol instant messenger. It is reported that this version of Gaim is prone to a flaw in the way that it handles malformed HTML data. An attacker exploiting this flaw would need to be able to communicate with a vulnerable GAIM user. Upon successful exploitation, the Gaim client would stop responding.
There is a second issue with this version of Gaim that is similar to the first. Specifically, downloaded files which include bracket characters like '(' or ')' will cause the client to crash.

Solution

Update to Gaim 1.1.4 or higher.

Plugin Details

Severity: Medium

ID: 2654

Published: 2/25/2005

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5.4

Temporal Score: 4.7

Vector: CVSS2#AV:N/AC:H/Au:N/C:N/I:N/A:C

CVSS v3

Risk Factor: Medium

Base Score: 5.9

Temporal Score: 5.7

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:rob_flynn:gaim

Reference Information

CVE: CVE-2005-0208, CVE-2005-0472, CVE-2005-0473

BID: 12589, 12660, 12667