Improper Input Validation Affecting pidgin package, versions <0:2.7.9-5.el6.2
Threat Intelligence
EPSS
1.23% (86th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS6-PIDGIN-2061031
- published 26 Jul 2021
- disclosed 6 May 2012
How to fix?
Upgrade Centos:6 pidgin to version 0:2.7.9-5.el6.2 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream pidgin package and not the pidgin package as distributed by Centos.
See How to fix? for Centos:6 relevant fixed versions and status.
msg.c in the MSN protocol plugin in libpurple in Pidgin before 2.10.4 does not properly handle crafted characters, which allows remote servers to cause a denial of service (application crash) by placing these characters in a text/plain message.
References
- http://www.securityfocus.com/bid/53400
- http://hg.pidgin.im/pidgin/main/rev/4d6bcb4f4ea4
- http://pidgin.im/news/security/?id=63
- https://access.redhat.com/security/cve/CVE-2012-2318
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:082
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17448
- http://rhn.redhat.com/errata/RHSA-2012-1102.html
- https://access.redhat.com/errata/RHSA-2012:1102
- http://secunia.com/advisories/50005
- https://hermes.opensuse.org/messages/15136503
CVSS Scores
version 3.1