First published: Fri May 07 2010(Updated: )
Pierre Noguès found a NULL pointer dereference in the Pidgin MSN SLP protocol implementation, by processing custom emoticon messages. A remote, authenticated user could use this deficiency to cause a denial of service (Pidgin crash). Acknowledgements: Red Hat would like to thank the Pidgin project for reporting this issue. Upstream acknowledges Pierre Noguès of Meta Security as the original reporter.
Affected Software | Affected Version | How to fix |
---|---|---|
Pidgin |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-589973 is classified as a denial of service vulnerability.
To fix REDHAT-BUG-589973, update to the latest version of Pidgin that addresses this NULL pointer dereference issue.
A remote, authenticated user can exploit REDHAT-BUG-589973 to crash Pidgin by sending specially crafted custom emoticon messages.
REDHAT-BUG-589973 is present in the versions of Pidgin before the fix was applied.
The impact of REDHAT-BUG-589973 is that it can lead to Pidgin crashing, resulting in a denial of service for users.