First published: Tue May 12 2009(Updated: )
The integer overflow fix for <a href="https://access.redhat.com/security/cve/CVE-2008-2927">CVE-2008-2927</a> was incomplete on 32 bit platforms. If a Pidgin user can receive a specially crafted MSN message, it may be possible to execute arbitrary code with the permissions of the user running Pidgin. This flaw is only exploitable by individuals who can message a user, which is controlled by the Pidgin privacy setting. The default setting is to only allow messages from users in the buddy list.
Affected Software | Affected Version | How to fix |
---|---|---|
Pidgin |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-500493 is likely high due to the potential for arbitrary code execution.
To fix REDHAT-BUG-500493, users should update Pidgin to the latest version where the integer overflow vulnerability has been addressed.
The potential risks associated with REDHAT-BUG-500493 include executing arbitrary code with the permissions of the user running Pidgin.
All versions of Pidgin on 32-bit platforms prior to the patch addressing this vulnerability are affected by REDHAT-BUG-500493.
Yes, REDHAT-BUG-500493 can significantly impact system security by allowing unauthorized code execution through specially crafted messages.