CVE-2009-1376

Multiple integer overflows in the msn_slplink_process_msg functions in the MSN protocol handler in (1) libpurple/protocols/msn/slplink.c and (2) libpurple/protocols/msnp9/slplink.c in Pidgin (formerly Gaim) before 2.5.6 on 32-bit platforms allow remote attackers to execute arbitrary code via a malformed SLP message with a crafted offset value, leading to buffer overflows.  NOTE: this issue exists because of an incomplete fix for CVE-2008-2927.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.3 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:C/I:C/A:C
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 95%
VendorProductVersion
pidginpidgin
𝑥
≤ 2.5.5
pidginpidgin
2.4.0:32_bit
pidginpidgin
2.4.1:32_bit
pidginpidgin
2.4.2:32_bit
pidginpidgin
2.4.3:32_bit
pidginpidgin
2.5.0:32_bit
pidginpidgin
2.5.2:32_bit
pidginpidgin
2.5.3:32_bit
pidginpidgin
2.5.4:32_bit
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
pidgin
bullseye
2.14.1-1
fixed
lenny
not-affected
bookworm
2.14.12-1
fixed
sid
2.14.13-2
fixed
trixie
2.14.13-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
gaim
jaunty
dne
intrepid
dne
hardy
dne
gutsy
dne
dapper
Fixed 1:1.5.0+1.5.1cvs20051015-1ubuntu10.2
released
pidgin
jaunty
Fixed 1:2.5.5-1ubuntu8.1
released
intrepid
Fixed 1:2.5.2-0ubuntu1.2
released
hardy
Fixed 1:2.4.1-1ubuntu2.4
released
feisty
dne
dapper
dne
Common Weakness Enumeration
References