Unrated severityNVD Advisory· Published Oct 20, 2004· Updated Apr 16, 2026
CVE-2004-0785
CVE-2004-0785
Description
Multiple buffer overflows in Gaim before 0.82 allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) Rich Text Format (RTF) messages, (2) a long hostname for the local system as obtained from DNS, or (3) a long URL that is not properly handled by the URL decoder.
Affected products
29cpe:2.3:a:rob_flynn:gaim:0.10:*:*:*:*:*:*:*+ 28 more
- cpe:2.3:a:rob_flynn:gaim:0.10:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.10.3:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.50:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.51:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.52:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.53:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.54:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.55:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.56:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.57:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.58:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.59:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.59.1:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.60:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.61:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.62:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.63:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.64:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.65:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.66:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.67:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.68:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.69:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.70:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.71:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.72:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.73:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.74:*:*:*:*:*:*:*
- cpe:2.3:a:rob_flynn:gaim:0.75:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
20- gaim.sourceforge.net/security/nvdPatchVendor Advisory
- www.fedoranews.org/updates/FEDORA-2004-278.shtmlnvdPatchVendor Advisory
- www.fedoranews.org/updates/FEDORA-2004-279.shtmlnvdPatchVendor Advisory
- www.gentoo.org/security/en/glsa/glsa-200408-27.xmlnvdVendor Advisory
- gaim.sourceforge.net/security/nvd
- gaim.sourceforge.net/security/nvd
- secunia.com/advisories/12383nvd
- secunia.com/advisories/12480nvd
- secunia.com/advisories/12929nvd
- secunia.com/advisories/13101nvd
- securitytracker.com/idnvd
- www.osvdb.org/9261nvd
- www.osvdb.org/9262nvd
- www.osvdb.org/9263nvd
- www.redhat.com/support/errata/RHSA-2004-400.htmlnvd
- www.securityfocus.com/bid/11056nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/17141nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/17142nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/17143nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10907nvd
News mentions
0No linked articles in our index yet.