[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2009-1376

Date: (C)2009-05-26   (M)2017-10-04
 
CVSS Score: 9.3Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE











Multiple integer overflows in the msn_slplink_process_msg functions in the MSN protocol handler in (1) libpurple/protocols/msn/slplink.c and (2) libpurple/protocols/msnp9/slplink.c in Pidgin (formerly Gaim) before 2.5.6 on 32-bit platforms allow remote attackers to execute arbitrary code via a malformed SLP message with a crafted offset value, leading to buffer overflows. NOTE: this issue exists because of an incomplete fix for CVE-2008-2927.

Reference:
BID-35067
SECUNIA-35188
SECUNIA-35194
SECUNIA-35202
SECUNIA-35215
SECUNIA-35294
SECUNIA-35329
SECUNIA-35330
SECUNIA-37071
ADV-2009-1396
DSA-1805
FEDORA-2009-5552
FEDORA-2009-5583
FEDORA-2009-5597
GLSA-200905-07
MDVSA-2009:140
MDVSA-2009:173
RHSA-2009:1059
RHSA-2009:1060
USN-781-1
USN-781-2
http://www.pidgin.im/news/security/?id=32
https://bugzilla.redhat.com/show_bug.cgi?id=500493
pidgin-msn-slp-bo(50680)

CPE    1
cpe:/a:pidgin:pidgin:2.5.5
CWE    1
CWE-189
OVAL    21
oval:org.secpod.oval:def:300610
oval:org.secpod.oval:def:200629
oval:org.secpod.oval:def:101490
oval:org.secpod.oval:def:202159
...

© 2013 SecPod Technologies