CVE-2011-3594
04.11.2011, 21:55
The g_markup_escape_text function in the SILC protocol plug-in in libpurple 2.10.0 and earlier, as used in Pidgin and possibly other products, allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with certain versions of glib2.Enginsight
Vendor | Product | Version |
---|---|---|
pidgin | libpurple | 𝑥 ≤ 2.10.0 |
pidgin | libpurple | 1.0 |
pidgin | libpurple | 2.0.0 |
pidgin | libpurple | 2.0.1 |
pidgin | libpurple | 2.0.2 |
pidgin | libpurple | 2.1.0 |
pidgin | libpurple | 2.1.1 |
pidgin | libpurple | 2.2.0 |
pidgin | libpurple | 2.2.1 |
pidgin | libpurple | 2.2.2 |
pidgin | libpurple | 2.3.0 |
pidgin | libpurple | 2.3.1 |
pidgin | libpurple | 2.4.0 |
pidgin | libpurple | 2.4.1 |
pidgin | libpurple | 2.4.2 |
pidgin | libpurple | 2.4.3 |
pidgin | libpurple | 2.5.0 |
pidgin | libpurple | 2.5.1 |
pidgin | libpurple | 2.5.2 |
pidgin | libpurple | 2.5.3 |
pidgin | libpurple | 2.5.4 |
pidgin | libpurple | 2.5.5 |
pidgin | libpurple | 2.5.6 |
pidgin | libpurple | 2.5.7 |
pidgin | libpurple | 2.5.8 |
pidgin | libpurple | 2.5.9 |
pidgin | libpurple | 2.6.0 |
pidgin | libpurple | 2.6.1 |
pidgin | libpurple | 2.6.2 |
pidgin | libpurple | 2.6.3 |
pidgin | libpurple | 2.6.4 |
pidgin | libpurple | 2.6.5 |
pidgin | libpurple | 2.6.6 |
pidgin | libpurple | 2.7.0 |
pidgin | libpurple | 2.7.1 |
pidgin | libpurple | 2.7.2 |
pidgin | libpurple | 2.7.3 |
pidgin | libpurple | 2.7.4 |
pidgin | libpurple | 2.7.5 |
pidgin | libpurple | 2.7.6 |
pidgin | libpurple | 2.7.7 |
pidgin | libpurple | 2.7.8 |
pidgin | libpurple | 2.7.9 |
pidgin | libpurple | 2.7.10 |
pidgin | libpurple | 2.7.11 |
pidgin | libpurple | 2.8.0 |
pidgin | libpurple | 2.9.0 |
pidgin | pidgin | * |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References