CVE-2009-1376
26.05.2009, 15:30
Multiple integer overflows in the msn_slplink_process_msg functions in the MSN protocol handler in (1) libpurple/protocols/msn/slplink.c and (2) libpurple/protocols/msnp9/slplink.c in Pidgin (formerly Gaim) before 2.5.6 on 32-bit platforms allow remote attackers to execute arbitrary code via a malformed SLP message with a crafted offset value, leading to buffer overflows. NOTE: this issue exists because of an incomplete fix for CVE-2008-2927.Enginsight
Vendor | Product | Version |
---|---|---|
pidgin | pidgin | 𝑥 ≤ 2.5.5 |
pidgin | pidgin | 2.4.0:32_bit |
pidgin | pidgin | 2.4.1:32_bit |
pidgin | pidgin | 2.4.2:32_bit |
pidgin | pidgin | 2.4.3:32_bit |
pidgin | pidgin | 2.5.0:32_bit |
pidgin | pidgin | 2.5.2:32_bit |
pidgin | pidgin | 2.5.3:32_bit |
pidgin | pidgin | 2.5.4:32_bit |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References