First published: Tue May 12 2009(Updated: )
A denial-of-service flaw was found in pidgin's QQ protocol handler. When the QQ protocol decrypts packet information, a heap based buffer overflow results, which could cause pidgin to crash.
Affected Software | Affected Version | How to fix |
---|---|---|
Pidgin |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-500490 is classified as a denial-of-service vulnerability which can lead to application crashes.
To fix REDHAT-BUG-500490, update to the latest version of Pidgin that addresses this buffer overflow vulnerability.
The affected software by REDHAT-BUG-500490 is the Pidgin messaging client.
REDHAT-BUG-500490 is classified as a heap-based buffer overflow vulnerability specifically in the QQ protocol handler.
The impact of REDHAT-BUG-500490 is the potential for Pidgin to crash when handling certain QQ protocol packets.