[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:600811
intrigeri discovered a format string error in pidgin-otr, an off-the-record messaging plugin for Pidgin. This could be exploited by a remote attacker to cause arbitrary code to be executed on the user"s machine. The problem is only in pidgin-otr. Other applications which use libotr are not affected.

oval:org.secpod.oval:def:103800
This is a Pidgin plugin which implements Off-the-Record Messaging. It is known to work under the Linux and Windows versions of Pidgin.

oval:org.secpod.oval:def:103781
This is a Pidgin plugin which implements Off-the-Record Messaging. It is known to work under the Linux and Windows versions of Pidgin.

oval:org.secpod.oval:def:1000463
The remote host is missing a patch 147993-10 containing a security fix. For more information please visit the reference link.

oval:org.secpod.oval:def:1000498
The remote host is missing a patch 147992-10 containing a security fix. For more information please visit the reference link.

oval:org.secpod.oval:def:2101117
The (1) otrl_base64_otr_decode function in src/b64.c; (2) otrl_proto_data_read_flags and (3) otrl_proto_accept_data functions in src/proto.c; and (4) decode function in toolkit/parse.c in libotr before 3.2.1 allocates a zero-length buffer when decoding a base64 string, which allows remote attackers ...

oval:org.secpod.oval:def:6386
The host is installed with Pidgin-otr plugin before 3.2.1-1 for Pidgin and is prone to format string vulnerability. A flaw is present in the Off-the-Record Messaging (OTR) pidgin-otr plugin, which fails to handle format string specifiers in data that generates a log message. Successful exploitation ...

CPE    1
cpe:/a:pidgin:pidgin
CWE    1
CWE-134
*CVE
CVE-2012-2369

© SecPod Technologies