CVE-2009-2694

The msn_slplink_process_msg function in libpurple/protocols/msn/slplink.c in libpurple, as used in Pidgin (formerly Gaim) before 2.5.9 and Adium 1.3.5 and earlier, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) by sending multiple crafted SLP (aka MSNSLP) messages to trigger an overwrite of an arbitrary memory location. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-1376.
References
Link Resource
http://developer.pidgin.im/viewmtn/revision/info/6f7343166c673bf0496ecb1afec9b633c1d54a0e Patch
http://developer.pidgin.im/wiki/ChangeLog
http://secunia.com/advisories/36384 Vendor Advisory
http://secunia.com/advisories/36392 Vendor Advisory
http://secunia.com/advisories/36401 Vendor Advisory
http://secunia.com/advisories/36402
http://secunia.com/advisories/36708
http://secunia.com/advisories/37071
http://sunsolve.sun.com/search/document.do?assetkey=1-66-266908-1
http://www.coresecurity.com/content/libpurple-arbitrary-write Exploit
http://www.debian.org/security/2009/dsa-1870 Patch
http://www.exploit-db.com/exploits/9615
http://www.pidgin.im/news/security/?id=34 Vendor Advisory
http://www.vupen.com/english/advisories/2009/2303 Vendor Advisory
http://www.vupen.com/english/advisories/2009/2663
https://bugzilla.redhat.com/show_bug.cgi?id=514957
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10319
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6320
https://rhn.redhat.com/errata/RHSA-2009-1218.html Vendor Advisory
http://developer.pidgin.im/viewmtn/revision/info/6f7343166c673bf0496ecb1afec9b633c1d54a0e Patch
http://developer.pidgin.im/wiki/ChangeLog
http://secunia.com/advisories/36384 Vendor Advisory
http://secunia.com/advisories/36392 Vendor Advisory
http://secunia.com/advisories/36401 Vendor Advisory
http://secunia.com/advisories/36402
http://secunia.com/advisories/36708
http://secunia.com/advisories/37071
http://sunsolve.sun.com/search/document.do?assetkey=1-66-266908-1
http://www.coresecurity.com/content/libpurple-arbitrary-write Exploit
http://www.debian.org/security/2009/dsa-1870 Patch
http://www.exploit-db.com/exploits/9615
http://www.pidgin.im/news/security/?id=34 Vendor Advisory
http://www.vupen.com/english/advisories/2009/2303 Vendor Advisory
http://www.vupen.com/english/advisories/2009/2663
https://bugzilla.redhat.com/show_bug.cgi?id=514957
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10319
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6320
https://rhn.redhat.com/errata/RHSA-2009-1218.html Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:adium:adium:*:*:*:*:*:*:*:*
cpe:2.3:a:adium:adium:1.2.7:*:*:*:*:*:*:*
cpe:2.3:a:adium:adium:1.3:*:*:*:*:*:*:*
cpe:2.3:a:adium:adium:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:adium:adium:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:adium:adium:1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:adium:adium:1.3.4:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*

History

21 Nov 2024, 01:05

Type Values Removed Values Added
References () http://developer.pidgin.im/viewmtn/revision/info/6f7343166c673bf0496ecb1afec9b633c1d54a0e - Patch () http://developer.pidgin.im/viewmtn/revision/info/6f7343166c673bf0496ecb1afec9b633c1d54a0e - Patch
References () http://developer.pidgin.im/wiki/ChangeLog - () http://developer.pidgin.im/wiki/ChangeLog -
References () http://secunia.com/advisories/36384 - Vendor Advisory () http://secunia.com/advisories/36384 - Vendor Advisory
References () http://secunia.com/advisories/36392 - Vendor Advisory () http://secunia.com/advisories/36392 - Vendor Advisory
References () http://secunia.com/advisories/36401 - Vendor Advisory () http://secunia.com/advisories/36401 - Vendor Advisory
References () http://secunia.com/advisories/36402 - () http://secunia.com/advisories/36402 -
References () http://secunia.com/advisories/36708 - () http://secunia.com/advisories/36708 -
References () http://secunia.com/advisories/37071 - () http://secunia.com/advisories/37071 -
References () http://sunsolve.sun.com/search/document.do?assetkey=1-66-266908-1 - () http://sunsolve.sun.com/search/document.do?assetkey=1-66-266908-1 -
References () http://www.coresecurity.com/content/libpurple-arbitrary-write - Exploit () http://www.coresecurity.com/content/libpurple-arbitrary-write - Exploit
References () http://www.debian.org/security/2009/dsa-1870 - Patch () http://www.debian.org/security/2009/dsa-1870 - Patch
References () http://www.exploit-db.com/exploits/9615 - () http://www.exploit-db.com/exploits/9615 -
References () http://www.pidgin.im/news/security/?id=34 - Vendor Advisory () http://www.pidgin.im/news/security/?id=34 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2009/2303 - Vendor Advisory () http://www.vupen.com/english/advisories/2009/2303 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2009/2663 - () http://www.vupen.com/english/advisories/2009/2663 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=514957 - () https://bugzilla.redhat.com/show_bug.cgi?id=514957 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10319 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10319 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6320 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6320 -
References () https://rhn.redhat.com/errata/RHSA-2009-1218.html - Vendor Advisory () https://rhn.redhat.com/errata/RHSA-2009-1218.html - Vendor Advisory

Information

Published : 2009-08-21 11:02

Updated : 2024-11-21 01:05


NVD link : CVE-2009-2694

Mitre link : CVE-2009-2694

CVE.ORG link : CVE-2009-2694


JSON object : View

Products Affected

pidgin

  • pidgin

adium

  • adium
CWE
CWE-399

Resource Management Errors