First published: Sat May 02 2009(Updated: )
Multiple integer overflows in the msn_slplink_process_msg functions in the MSN protocol handler in (1) libpurple/protocols/msn/slplink.c and (2) libpurple/protocols/msnp9/slplink.c in Pidgin (formerly Gaim) before 2.5.6 on 32-bit platforms allow remote attackers to execute arbitrary code via a malformed SLP message with a crafted offset value, leading to buffer overflows. NOTE: this issue exists because of an incomplete fix for CVE-2008-2927.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pidgin Pidgin | =2.5.2-32_bit | |
Pidgin Pidgin | =2.5.3-32_bit | |
Pidgin Pidgin | =2.5.0-32_bit | |
Pidgin Pidgin | =2.4.2-32_bit | |
Pidgin Pidgin | <=2.5.5 | |
Pidgin Pidgin | =2.4.0-32_bit | |
Pidgin Pidgin | =2.4.3-32_bit | |
Pidgin Pidgin | =2.5.4-32_bit | |
Pidgin Pidgin | =2.4.1-32_bit | |
redhat/pidgin | <0:1.5.1-3.el3 | 0:1.5.1-3.el3 |
redhat/pidgin | <0:2.5.5-2.el4 | 0:2.5.5-2.el4 |
redhat/pidgin | <0:2.5.5-3.el5 | 0:2.5.5-3.el5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.