Improper Input Validation Affecting pidgin package, versions <0:2.6.6-6.el6_0
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS6-PIDGIN-2033623
- published 26 Jul 2021
- disclosed 20 Oct 2010
Introduced: 20 Oct 2010
CVE-2010-3711 Open this link in a new tabHow to fix?
Upgrade Centos:6 pidgin to version 0:2.6.6-6.el6_0 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream pidgin package and not the pidgin package as distributed by Centos.
See How to fix? for Centos:6 relevant fixed versions and status.
libpurple in Pidgin before 2.7.4 does not properly validate the return value of the purple_base64_decode function, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and application crash) via a crafted message, related to the plugins for MSN, MySpaceIM, XMPP, and Yahoo! and the NTLM authentication support.
References
- http://www.securityfocus.com/bid/44283
- http://developer.pidgin.im/viewmtn/revision/info/b01c6a1f7fe4d86b83f5f10917b3cb713989cfcc
- http://pidgin.im/news/security/?id=48
- https://bugzilla.redhat.com/show_bug.cgi?id=641921
- https://access.redhat.com/security/cve/CVE-2010-3711
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050227.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050695.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-October/050133.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2010:208
- http://www.osvdb.org/68773
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18506
- http://www.redhat.com/support/errata/RHSA-2010-0788.html
- http://www.redhat.com/support/errata/RHSA-2010-0890.html
- https://access.redhat.com/errata/RHSA-2010:0890
- http://securitytracker.com/id?1024623
- http://secunia.com/advisories/41893
- http://secunia.com/advisories/41899
- http://secunia.com/advisories/42075
- http://secunia.com/advisories/42294
- http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.462352
- http://www.ubuntu.com/usn/USN-1014-1
- http://www.vupen.com/english/advisories/2010/2753
- http://www.vupen.com/english/advisories/2010/2754
- http://www.vupen.com/english/advisories/2010/2755
- http://www.vupen.com/english/advisories/2010/2847
- http://www.vupen.com/english/advisories/2010/2851
- http://www.vupen.com/english/advisories/2010/2870
- https://exchange.xforce.ibmcloud.com/vulnerabilities/62708