cpe:/a:pidgin:pidgin:2.0.0 cpe:/a:pidgin:pidgin:2.0.1 cpe:/a:pidgin:pidgin:2.0.2 cpe:/a:pidgin:pidgin:2.1.0 cpe:/a:pidgin:pidgin:2.1.1 cpe:/a:pidgin:pidgin:2.2.0 cpe:/a:pidgin:pidgin:2.2.1 cpe:/a:pidgin:pidgin:2.2.2 cpe:/a:pidgin:pidgin:2.3.0 cpe:/a:pidgin:pidgin:2.3.1 cpe:/a:pidgin:pidgin:2.4.0 cpe:/a:pidgin:pidgin:2.4.1 cpe:/a:pidgin:pidgin:2.4.2 cpe:/a:pidgin:pidgin:2.4.3 cpe:/a:pidgin:pidgin:2.5.0 cpe:/a:pidgin:pidgin:2.5.1 cpe:/a:pidgin:pidgin:2.5.2 cpe:/a:pidgin:pidgin:2.5.3 cpe:/a:pidgin:pidgin:2.5.4 cpe:/a:pidgin:pidgin:2.5.5 cpe:/a:pidgin:pidgin:2.5.6 cpe:/a:pidgin:pidgin:2.5.7 cpe:/a:pidgin:pidgin:2.5.8 cpe:/a:pidgin:pidgin:2.5.9 cpe:/a:pidgin:pidgin:2.6.0 cpe:/a:pidgin:pidgin:2.6.1 cpe:/a:pidgin:pidgin:2.6.2 cpe:/a:pidgin:pidgin:2.6.4 cpe:/a:pidgin:pidgin:2.6.5 cpe:/a:pidgin:pidgin:2.6.6 cpe:/a:pidgin:pidgin:2.7.0 cpe:/a:pidgin:pidgin:2.7.1 cpe:/a:pidgin:pidgin:2.7.2 cpe:/a:pidgin:pidgin:2.7.3 CVE-2010-3711 2010-10-27T20:00:03.673-04:00 2017-09-18T21:31:31.597-04:00 4.0 NETWORK LOW SINGLE_INSTANCE NONE NONE PARTIAL http://nvd.nist.gov 2010-10-28T12:07:00.000-04:00 SECTRACK 1024623 SECUNIA 41893 SECUNIA 41899 SECUNIA 42075 SECUNIA 42294 BID 44283 OSVDB 68773 VUPEN ADV-2010-2753 VUPEN ADV-2010-2754 VUPEN ADV-2010-2755 VUPEN ADV-2010-2847 VUPEN ADV-2010-2851 VUPEN ADV-2010-2870 FEDORA FEDORA-2010-16629 FEDORA FEDORA-2010-16876 FEDORA FEDORA-2010-17130 MANDRIVA MDVSA-2010:208 REDHAT RHSA-2010:0788 REDHAT RHSA-2010:0890 SLACKWARE SSA:2010-305-02 UBUNTU USN-1014-1 CONFIRM http://developer.pidgin.im/viewmtn/revision/info/b01c6a1f7fe4d86b83f5f10917b3cb713989cfcc CONFIRM http://pidgin.im/news/security/?id=48 CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=641921 XF pidgin-purplebase64decode-dos(62708) libpurple in Pidgin before 2.7.4 does not properly validate the return value of the purple_base64_decode function, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and application crash) via a crafted message, related to the plugins for MSN, MySpaceIM, XMPP, and Yahoo! and the NTLM authentication support.