Joined: 12 May 2004
|Posted: Thu Sep 27, 2012 12:26 pm Post subject: [ GLSA 201209-17 ] Pidgin: Arbitrary code execution
|Gentoo Linux Security Advisory
Title: Pidgin: Arbitrary code execution (GLSA 201209-17)
Date: September 27, 2012
A buffer overflow in Pidgin might allow remote attackers to execute
arbitrary code or cause Denial of Service.
Pidgin is a GTK Instant Messenger client for a variety of instant
messaging protocols. libpurple is the core library for Pidgin.
Vulnerable: < 2.10.6
Unaffected: >= 2.10.6
Architectures: All supported architectures
A stack-based buffer overflow vulnerability has been found in the MXit
protocol plug-in for libpurple.
A remote attacker could possibly execute arbitrary code with the
privileges of the Pidgin process, or cause a Denial of Service condition.
There is no known workaround at this time.
All Pidgin users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=net-im/pidgin-2.10.6"
Last edited by GLSA on Tue Sep 02, 2014 4:31 am; edited 2 times in total