First published: Sun Dec 27 2009(Updated: )
Directory traversal vulnerability in slp.c in the MSN protocol plugin in libpurple in Pidgin 2.6.4 and Adium 1.3.8 allows remote attackers to read arbitrary files via a .. (dot dot) in an application/x-msnmsgrp2p MSN emoticon (aka custom smiley) request, a related issue to CVE-2004-0122. NOTE: it could be argued that this is resultant from a vulnerability in which an emoticon download request is processed even without a preceding text/x-mms-emoticon message that announced availability of the emoticon.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adium Adium | =1.3.8 | |
Pidgin Pidgin | =2.6.4 | |
redhat/pidgin | <0:2.6.5-1.el4.1 | 0:2.6.5-1.el4.1 |
redhat/pidgin | <0:2.6.5-1.el5 | 0:2.6.5-1.el5 |
Fedoraproject Fedora | =11 | |
Fedoraproject Fedora | =12 | |
openSUSE openSUSE | >=11.0<=11.2 | |
SUSE Linux Enterprise | =11.0 | |
SUSE Linux Enterprise Server | =10-sp2 | |
SUSE Linux Enterprise Server | =10-sp3 | |
Redhat Enterprise Linux | =4.0 | |
Redhat Enterprise Linux | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.