First published: Thu Feb 06 2014(Updated: )
libpurple/protocols/yahoo/libymsg.c in Pidgin before 2.10.8 allows remote attackers to cause a denial of service (crash) via a Yahoo! P2P message with a crafted length field, which triggers a buffer over-read.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pidgin | <=2.10.7 | |
Pidgin | =2.0.0 | |
Pidgin | =2.0.1 | |
Pidgin | =2.0.2 | |
Pidgin | =2.1.0 | |
Pidgin | =2.1.1 | |
Pidgin | =2.2.0 | |
Pidgin | =2.2.1 | |
Pidgin | =2.2.2 | |
Pidgin | =2.3.0 | |
Pidgin | =2.3.1 | |
Pidgin | =2.4.0 | |
Pidgin | =2.4.1 | |
Pidgin | =2.4.2 | |
Pidgin | =2.4.3 | |
Pidgin | =2.5.0 | |
Pidgin | =2.5.1 | |
Pidgin | =2.5.2 | |
Pidgin | =2.5.3 | |
Pidgin | =2.5.4 | |
Pidgin | =2.5.5 | |
Pidgin | =2.5.6 | |
Pidgin | =2.5.7 | |
Pidgin | =2.5.8 | |
Pidgin | =2.5.9 | |
Pidgin | =2.6.0 | |
Pidgin | =2.6.1 | |
Pidgin | =2.6.2 | |
Pidgin | =2.6.3 | |
Pidgin | =2.6.4 | |
Pidgin | =2.6.5 | |
Pidgin | =2.6.6 | |
Pidgin | =2.7.0 | |
Pidgin | =2.7.1 | |
Pidgin | =2.7.2 | |
Pidgin | =2.7.3 | |
Pidgin | =2.7.4 | |
Pidgin | =2.7.5 | |
Pidgin | =2.7.6 | |
Pidgin | =2.7.7 | |
Pidgin | =2.7.8 | |
Pidgin | =2.7.9 | |
Pidgin | =2.7.10 | |
Pidgin | =2.7.11 | |
Pidgin | =2.8.0 | |
Pidgin | =2.9.0 | |
Pidgin | =2.10.0 | |
Pidgin | =2.10.1 | |
Pidgin | =2.10.2 | |
Pidgin | =2.10.3 | |
Pidgin | =2.10.4 | |
Pidgin | =2.10.5 | |
Pidgin | =2.10.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6481 is classified as a denial of service vulnerability due to a buffer over-read that can crash the application.
To mitigate CVE-2013-6481, upgrade Pidgin to version 2.10.8 or later where the vulnerability has been addressed.
CVE-2013-6481 affects Pidgin versions prior to 2.10.8, including versions 2.0.0 through 2.10.7.
CVE-2013-6481 can be exploited through targeted Yahoo! P2P messages with a crafted length field.
CVE-2013-6481 is a remote vulnerability, allowing attackers to cause denial of service from remote locations.