First published: Tue Mar 08 2011(Updated: )
Multiple NULL pointer dereference flaws were found in the way Yahoo protocol plug-in of the Pidgin instant messaging client handled malformed YMSG packets (SMS messages and notification packets). A remote, authenticated user could use this flaw to cause denial of service (Pidgin crash) via specially-crafted notification message. The SMS messages handling issue is exploitable only via specially-crafted SMS message, sent from remote, malicious Yahoo server. Acknowledgements: Red Hat would like to thank the Pidgin project for reporting these issues. Upstream acknowledges Marius Wachtler as the original reporter.
Affected Software | Affected Version | How to fix |
---|---|---|
Pidgin |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-683031 is categorized as a denial of service vulnerability.
To fix REDHAT-BUG-683031, update Pidgin to the latest version where the vulnerability has been patched.
The vulnerability in REDHAT-BUG-683031 affects users of the Pidgin instant messaging client using the Yahoo protocol plug-in.
Yes, REDHAT-BUG-683031 can be exploited remotely by an authenticated user.
REDHAT-BUG-683031 is associated with a denial of service attack resulting in a crash of the Pidgin client.