First published: Fri May 07 2010(Updated: )
Pierre Noguès found a NULL pointer dereference in the Pidgin MSN SLP protocol implementation, by processing custom emoticon messages. A remote, authenticated user could use this deficiency to cause a denial of service (Pidgin crash). Acknowledgements: Red Hat would like to thank the Pidgin project for reporting this issue. Upstream acknowledges Pierre Noguès of Meta Security as the original reporter.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/pidgin | <0:2.6.6-5.el4_8 | 0:2.6.6-5.el4_8 |
redhat/pidgin | <0:2.6.6-5.el5_5 | 0:2.6.6-5.el5_5 |
Pidgin | <2.7.0 | |
Ubuntu Linux | =8.04 | |
Ubuntu Linux | =9.10 | |
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =10.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2010-1624 is categorized as a denial of service vulnerability affecting the Pidgin software.
To fix CVE-2010-1624, upgrade to a patched version of Pidgin, specifically version 2.6.6-5.el4_8 or 2.6.6-5.el5_5.
CVE-2010-1624 can be exploited by a remote, authenticated user through specially crafted custom emoticon messages.
CVE-2010-1624 affects Pidgin versions prior to 2.6.6-5.el4_8 and 2.6.6-5.el5_5, as well as certain Ubuntu Linux versions.
The impact of CVE-2010-1624 is that it can cause Pidgin to crash, leading to a denial of service for users.