GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Thu Sep 27, 2012 12:26 pm Post subject: [ GLSA 201209-17 ] Pidgin: Arbitrary code execution |
|
|
Gentoo Linux Security Advisory
Title: Pidgin: Arbitrary code execution (GLSA 201209-17)
Severity: high
Exploitable: remote
Date: September 27, 2012
Bug(s): #425076
ID: 201209-17
Synopsis
A buffer overflow in Pidgin might allow remote attackers to execute
arbitrary code or cause Denial of Service.
Background
Pidgin is a GTK Instant Messenger client for a variety of instant
messaging protocols. libpurple is the core library for Pidgin.
Affected Packages
Package: net-im/pidgin
Vulnerable: < 2.10.6
Unaffected: >= 2.10.6
Architectures: All supported architectures
Description
A stack-based buffer overflow vulnerability has been found in the MXit
protocol plug-in for libpurple.
Impact
A remote attacker could possibly execute arbitrary code with the
privileges of the Pidgin process, or cause a Denial of Service condition.
Workaround
There is no known workaround at this time.
Resolution
All Pidgin users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=net-im/pidgin-2.10.6"
|
References
CVE-2012-3374
Last edited by GLSA on Tue Sep 02, 2014 4:31 am; edited 2 times in total |
|