First published: Mon Jul 18 2011(Updated: )
A NULL pointer dereference flaw was found in the way IRC protocol plug-in of the Pidgin multiprotocol instant messaging client processed certain nick names, when list set of users (/who command) was issued upon user session startup and connecting user has had certain encoding configuration setup. A remote attacker could use a specially-crafted string as their nickname to cause the Pidgin client on the side of the victim (connecting user) to crash. Upstream bug report: [1] <a href="http://developer.pidgin.im/ticket/14341">http://developer.pidgin.im/ticket/14341</a> Acknowledgements: Red Hat would like to thank the Pidgin project for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
Pidgin |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-722939 is considered high due to the potential for remote code execution through a NULL pointer dereference.
To fix REDHAT-BUG-722939, update your Pidgin client to the latest version that addresses this vulnerability.
All versions of Pidgin that include the IRC protocol plug-in prior to the patch are affected by REDHAT-BUG-722939.
REDHAT-BUG-722939 could potentially allow an attacker to exploit user sessions, leading to unauthorized access to user data.
Yes, REDHAT-BUG-722939 specifically relates to the handling of nick names when executing the /who command in Pidgin's IRC protocol plug-in.