CVE-2009-1376

EUVD-2009-1374
Multiple integer overflows in the msn_slplink_process_msg functions in the MSN protocol handler in (1) libpurple/protocols/msn/slplink.c and (2) libpurple/protocols/msnp9/slplink.c in Pidgin (formerly Gaim) before 2.5.6 on 32-bit platforms allow remote attackers to execute arbitrary code via a malformed SLP message with a crafted offset value, leading to buffer overflows.  NOTE: this issue exists because of an incomplete fix for CVE-2008-2927.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.3 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:C/I:C/A:C
Base Score
CVSS 3.x
EPSS Score
Percentile: 96%
Affected Products (NVD)
VendorProductVersion
pidginpidgin
𝑥
≤ 2.5.5
pidginpidgin
2.4.0:32_bit
pidginpidgin
2.4.1:32_bit
pidginpidgin
2.4.2:32_bit
pidginpidgin
2.4.3:32_bit
pidginpidgin
2.5.0:32_bit
pidginpidgin
2.5.2:32_bit
pidginpidgin
2.5.3:32_bit
pidginpidgin
2.5.4:32_bit
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
pidgin
bookworm
2.14.12-1
fixed
bullseye
2.14.1-1
fixed
lenny
not-affected
sid
2.14.13-2
fixed
trixie
2.14.13-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
gaim
dapper
Fixed 1:1.5.0+1.5.1cvs20051015-1ubuntu10.2
released
gutsy
dne
hardy
dne
intrepid
dne
jaunty
dne
pidgin
dapper
dne
feisty
dne
hardy
Fixed 1:2.4.1-1ubuntu2.4
released
intrepid
Fixed 1:2.5.2-0ubuntu1.2
released
jaunty
Fixed 1:2.5.5-1ubuntu8.1
released
Common Weakness Enumeration
References