Zero-friction vulnerability management platform

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Pidgin Multiple Buffer Overflow Vulnerabilities (Windows)

Information

Severity

Severity

Critical

Family

Family

Buffer overflow

CVSSv2 Base

CVSSv2 Base

9.3

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:M/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

13 years ago

Modified

Modified

3 years ago

Summary

This host has installed pidgin and is prone to Multiple Buffer Overflow Vulnerabilities

Insight

Insight

The multiple flaws are due to, - a boundary error in the XMPP SOCKS5 'bytestream' server when initiating an outbound XMPP file transfer. - a boundary error in the 'decrypt_out()' function while processing malicious QQ packet. - a boundary error exists in the implementation of the 'PurpleCircBuffer' structure and can be exploited via vectors involving XMPP or Sametime protocol. - a truncation error in function 'libpurple/protocols/msn/slplink.c' and 'libpurple/protocols/msnp9/slplink.c' when processing MSN SLP messages with a crafted offset value.

Affected Software

Affected Software

Pidgin version prior to 2.5.6 on Windows.

Solution

Solution

Upgrade to version 2.5.6 or later.

Common Vulnerabilities and Exposures (CVE)