CVE-2009-1373

Buffer overflow in the XMPP SOCKS5 bytestream server in Pidgin (formerly Gaim) before 2.5.6 allows remote authenticated users to execute arbitrary code via vectors involving an outbound XMPP file transfer. NOTE: some of these details are obtained from third party information.
References
Link Resource
http://debian.org/security/2009/dsa-1805
http://secunia.com/advisories/35188
http://secunia.com/advisories/35194 Vendor Advisory
http://secunia.com/advisories/35202 Vendor Advisory
http://secunia.com/advisories/35215
http://secunia.com/advisories/35294
http://secunia.com/advisories/35329
http://secunia.com/advisories/35330
http://www.gentoo.org/security/en/glsa/glsa-200905-07.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2009:140
http://www.mandriva.com/security/advisories?name=MDVSA-2009:173
http://www.pidgin.im/news/security/?id=29 Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2009-1059.html
http://www.redhat.com/support/errata/RHSA-2009-1060.html
http://www.securityfocus.com/bid/35067 Patch
http://www.ubuntu.com/usn/USN-781-1
http://www.ubuntu.com/usn/USN-781-2
http://www.vupen.com/english/advisories/2009/1396
https://bugzilla.redhat.com/show_bug.cgi?id=500488
https://exchange.xforce.ibmcloud.com/vulnerabilities/50682
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17722
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9005
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00033.html
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00051.html
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00075.html
http://debian.org/security/2009/dsa-1805
http://secunia.com/advisories/35188
http://secunia.com/advisories/35194 Vendor Advisory
http://secunia.com/advisories/35202 Vendor Advisory
http://secunia.com/advisories/35215
http://secunia.com/advisories/35294
http://secunia.com/advisories/35329
http://secunia.com/advisories/35330
http://www.gentoo.org/security/en/glsa/glsa-200905-07.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2009:140
http://www.mandriva.com/security/advisories?name=MDVSA-2009:173
http://www.pidgin.im/news/security/?id=29 Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2009-1059.html
http://www.redhat.com/support/errata/RHSA-2009-1060.html
http://www.securityfocus.com/bid/35067 Patch
http://www.ubuntu.com/usn/USN-781-1
http://www.ubuntu.com/usn/USN-781-2
http://www.vupen.com/english/advisories/2009/1396
https://bugzilla.redhat.com/show_bug.cgi?id=500488
https://exchange.xforce.ibmcloud.com/vulnerabilities/50682
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17722
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9005
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00033.html
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00051.html
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00075.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.0.2:*:linux:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*

History

21 Nov 2024, 01:02

Type Values Removed Values Added
References () http://debian.org/security/2009/dsa-1805 - () http://debian.org/security/2009/dsa-1805 -
References () http://secunia.com/advisories/35188 - () http://secunia.com/advisories/35188 -
References () http://secunia.com/advisories/35194 - Vendor Advisory () http://secunia.com/advisories/35194 - Vendor Advisory
References () http://secunia.com/advisories/35202 - Vendor Advisory () http://secunia.com/advisories/35202 - Vendor Advisory
References () http://secunia.com/advisories/35215 - () http://secunia.com/advisories/35215 -
References () http://secunia.com/advisories/35294 - () http://secunia.com/advisories/35294 -
References () http://secunia.com/advisories/35329 - () http://secunia.com/advisories/35329 -
References () http://secunia.com/advisories/35330 - () http://secunia.com/advisories/35330 -
References () http://www.gentoo.org/security/en/glsa/glsa-200905-07.xml - () http://www.gentoo.org/security/en/glsa/glsa-200905-07.xml -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2009:140 - () http://www.mandriva.com/security/advisories?name=MDVSA-2009:140 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2009:173 - () http://www.mandriva.com/security/advisories?name=MDVSA-2009:173 -
References () http://www.pidgin.im/news/security/?id=29 - Patch, Vendor Advisory () http://www.pidgin.im/news/security/?id=29 - Patch, Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2009-1059.html - () http://www.redhat.com/support/errata/RHSA-2009-1059.html -
References () http://www.redhat.com/support/errata/RHSA-2009-1060.html - () http://www.redhat.com/support/errata/RHSA-2009-1060.html -
References () http://www.securityfocus.com/bid/35067 - Patch () http://www.securityfocus.com/bid/35067 - Patch
References () http://www.ubuntu.com/usn/USN-781-1 - () http://www.ubuntu.com/usn/USN-781-1 -
References () http://www.ubuntu.com/usn/USN-781-2 - () http://www.ubuntu.com/usn/USN-781-2 -
References () http://www.vupen.com/english/advisories/2009/1396 - () http://www.vupen.com/english/advisories/2009/1396 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=500488 - () https://bugzilla.redhat.com/show_bug.cgi?id=500488 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/50682 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/50682 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17722 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17722 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9005 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9005 -
References () https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00033.html - () https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00033.html -
References () https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00051.html - () https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00051.html -
References () https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00075.html - () https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00075.html -

07 Nov 2023, 02:03

Type Values Removed Values Added
Summary Buffer overflow in the XMPP SOCKS5 bytestream server in Pidgin (formerly Gaim) before 2.5.6 allows remote authenticated users to execute arbitrary code via vectors involving an outbound XMPP file transfer. NOTE: some of these details are obtained from third party information. Buffer overflow in the XMPP SOCKS5 bytestream server in Pidgin (formerly Gaim) before 2.5.6 allows remote authenticated users to execute arbitrary code via vectors involving an outbound XMPP file transfer. NOTE: some of these details are obtained from third party information.

Information

Published : 2009-05-26 15:30

Updated : 2024-11-21 01:02


NVD link : CVE-2009-1373

Mitre link : CVE-2009-1373

CVE.ORG link : CVE-2009-1373


JSON object : View

Products Affected

pidgin

  • pidgin
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer