First published: Tue Mar 08 2011(Updated: )
libymsg.c in the Yahoo! protocol plugin in libpurple in Pidgin 2.6.0 through 2.7.10 allows (1) remote authenticated users to cause a denial of service (NULL pointer dereference and application crash) via a malformed YMSG notification packet, and allows (2) remote Yahoo! servers to cause a denial of service (NULL pointer dereference and application crash) via a malformed YMSG SMS message.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pidgin | =2.6.0 | |
Pidgin | =2.6.1 | |
Pidgin | =2.6.2 | |
Pidgin | =2.6.4 | |
Pidgin | =2.6.5 | |
Pidgin | =2.6.6 | |
Pidgin | =2.7.0 | |
Pidgin | =2.7.1 | |
Pidgin | =2.7.2 | |
Pidgin | =2.7.3 | |
Pidgin | =2.7.4 | |
Pidgin | =2.7.5 | |
Pidgin | =2.7.6 | |
Pidgin | =2.7.7 | |
Pidgin | =2.7.8 | |
Pidgin | =2.7.9 | |
Pidgin | =2.7.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1091 has been classified as a high severity vulnerability due to its potential to cause denial of service via a NULL pointer dereference.
To fix CVE-2011-1091, you should upgrade to a version of Pidgin that is newer than 2.7.10, as the vulnerability has been addressed in subsequent releases.
CVE-2011-1091 affects Pidgin versions 2.6.0 through 2.7.10 using the Yahoo! protocol plugin.
Yes, CVE-2011-1091 can be exploited remotely by authenticated users or malicious Yahoo! servers.
Exploitation of CVE-2011-1091 can lead to application crashes and denial of service for Pidgin users.