CVE-2011-1091

libymsg.c in the Yahoo! protocol plugin in libpurple in Pidgin 2.6.0 through 2.7.10 allows (1) remote authenticated users to cause a denial of service (NULL pointer dereference and application crash) via a malformed YMSG notification packet, and allows (2) remote Yahoo! servers to cause a denial of service (NULL pointer dereference and application crash) via a malformed YMSG SMS message.
References
Link Resource
http://developer.pidgin.im/viewmtn/revision/diff/5cbe18129b6e7c660bc093f7e5e1414ceca17d04/with/a7c415abba1f5f01f79295337518837f73d99bb7/libpurple/protocols/yahoo/libymsg.c Patch
http://developer.pidgin.im/viewmtn/revision/info/a7c415abba1f5f01f79295337518837f73d99bb7 Patch
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055874.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056309.html
http://secunia.com/advisories/43695 Vendor Advisory
http://secunia.com/advisories/43721
http://secunia.com/advisories/46376
http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.466884
http://www.pidgin.im/news/security/?id=51 Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2011-0616.html
http://www.redhat.com/support/errata/RHSA-2011-1371.html
http://www.securityfocus.com/bid/46837
http://www.vupen.com/english/advisories/2011/0643
http://www.vupen.com/english/advisories/2011/0661
http://www.vupen.com/english/advisories/2011/0669
http://www.vupen.com/english/advisories/2011/0703
https://bugzilla.redhat.com/show_bug.cgi?id=683031
https://exchange.xforce.ibmcloud.com/vulnerabilities/66055
https://hermes.opensuse.org/messages/13195955
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18402
http://developer.pidgin.im/viewmtn/revision/diff/5cbe18129b6e7c660bc093f7e5e1414ceca17d04/with/a7c415abba1f5f01f79295337518837f73d99bb7/libpurple/protocols/yahoo/libymsg.c Patch
http://developer.pidgin.im/viewmtn/revision/info/a7c415abba1f5f01f79295337518837f73d99bb7 Patch
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055874.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056309.html
http://secunia.com/advisories/43695 Vendor Advisory
http://secunia.com/advisories/43721
http://secunia.com/advisories/46376
http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.466884
http://www.pidgin.im/news/security/?id=51 Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2011-0616.html
http://www.redhat.com/support/errata/RHSA-2011-1371.html
http://www.securityfocus.com/bid/46837
http://www.vupen.com/english/advisories/2011/0643
http://www.vupen.com/english/advisories/2011/0661
http://www.vupen.com/english/advisories/2011/0669
http://www.vupen.com/english/advisories/2011/0703
https://bugzilla.redhat.com/show_bug.cgi?id=683031
https://exchange.xforce.ibmcloud.com/vulnerabilities/66055
https://hermes.opensuse.org/messages/13195955
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18402
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*

History

21 Nov 2024, 01:25

Type Values Removed Values Added
References () http://developer.pidgin.im/viewmtn/revision/diff/5cbe18129b6e7c660bc093f7e5e1414ceca17d04/with/a7c415abba1f5f01f79295337518837f73d99bb7/libpurple/protocols/yahoo/libymsg.c - Patch () http://developer.pidgin.im/viewmtn/revision/diff/5cbe18129b6e7c660bc093f7e5e1414ceca17d04/with/a7c415abba1f5f01f79295337518837f73d99bb7/libpurple/protocols/yahoo/libymsg.c - Patch
References () http://developer.pidgin.im/viewmtn/revision/info/a7c415abba1f5f01f79295337518837f73d99bb7 - Patch () http://developer.pidgin.im/viewmtn/revision/info/a7c415abba1f5f01f79295337518837f73d99bb7 - Patch
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055874.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055874.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056309.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056309.html -
References () http://secunia.com/advisories/43695 - Vendor Advisory () http://secunia.com/advisories/43695 - Vendor Advisory
References () http://secunia.com/advisories/43721 - () http://secunia.com/advisories/43721 -
References () http://secunia.com/advisories/46376 - () http://secunia.com/advisories/46376 -
References () http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.466884 - () http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.466884 -
References () http://www.pidgin.im/news/security/?id=51 - Patch, Vendor Advisory () http://www.pidgin.im/news/security/?id=51 - Patch, Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2011-0616.html - () http://www.redhat.com/support/errata/RHSA-2011-0616.html -
References () http://www.redhat.com/support/errata/RHSA-2011-1371.html - () http://www.redhat.com/support/errata/RHSA-2011-1371.html -
References () http://www.securityfocus.com/bid/46837 - () http://www.securityfocus.com/bid/46837 -
References () http://www.vupen.com/english/advisories/2011/0643 - () http://www.vupen.com/english/advisories/2011/0643 -
References () http://www.vupen.com/english/advisories/2011/0661 - () http://www.vupen.com/english/advisories/2011/0661 -
References () http://www.vupen.com/english/advisories/2011/0669 - () http://www.vupen.com/english/advisories/2011/0669 -
References () http://www.vupen.com/english/advisories/2011/0703 - () http://www.vupen.com/english/advisories/2011/0703 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=683031 - () https://bugzilla.redhat.com/show_bug.cgi?id=683031 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/66055 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/66055 -
References () https://hermes.opensuse.org/messages/13195955 - () https://hermes.opensuse.org/messages/13195955 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18402 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18402 -

Information

Published : 2011-03-14 19:55

Updated : 2024-11-21 01:25


NVD link : CVE-2011-1091

Mitre link : CVE-2011-1091

CVE.ORG link : CVE-2011-1091


JSON object : View

Products Affected

pidgin

  • pidgin