CVE-2011-3184

The msn_httpconn_parse_data function in httpconn.c in the MSN protocol plugin in libpurple in Pidgin before 2.10.0 does not properly handle HTTP 100 responses, which allows remote attackers to cause a denial of service (incorrect memory access and application crash) via vectors involving a crafted server message.
References
Link Resource
http://developer.pidgin.im/viewmtn/revision/diff/5c2dba4a7e2e76b76e7f472b88953a4316706d43/with/16af0661899a978b4fedc1c165965b85009013d1/libpurple/protocols/msn/httpconn.c Patch
http://developer.pidgin.im/viewmtn/revision/info/16af0661899a978b4fedc1c165965b85009013d1 Patch
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/064943.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065190.html
http://pidgin.im/news/security/?id=54 Patch Vendor Advisory
http://secunia.com/advisories/45663 Vendor Advisory
http://secunia.com/advisories/45916
http://securitytracker.com/id?1025961
http://www.openwall.com/lists/oss-security/2011/08/22/10
http://www.openwall.com/lists/oss-security/2011/08/22/12
http://www.openwall.com/lists/oss-security/2011/08/22/4
http://www.openwall.com/lists/oss-security/2011/08/22/7
http://www.securityfocus.com/bid/49268
https://bugzilla.redhat.com/show_bug.cgi?id=732405
https://exchange.xforce.ibmcloud.com/vulnerabilities/69341
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18284
http://developer.pidgin.im/viewmtn/revision/diff/5c2dba4a7e2e76b76e7f472b88953a4316706d43/with/16af0661899a978b4fedc1c165965b85009013d1/libpurple/protocols/msn/httpconn.c Patch
http://developer.pidgin.im/viewmtn/revision/info/16af0661899a978b4fedc1c165965b85009013d1 Patch
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/064943.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065190.html
http://pidgin.im/news/security/?id=54 Patch Vendor Advisory
http://secunia.com/advisories/45663 Vendor Advisory
http://secunia.com/advisories/45916
http://securitytracker.com/id?1025961
http://www.openwall.com/lists/oss-security/2011/08/22/10
http://www.openwall.com/lists/oss-security/2011/08/22/12
http://www.openwall.com/lists/oss-security/2011/08/22/4
http://www.openwall.com/lists/oss-security/2011/08/22/7
http://www.securityfocus.com/bid/49268
https://bugzilla.redhat.com/show_bug.cgi?id=732405
https://exchange.xforce.ibmcloud.com/vulnerabilities/69341
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18284
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:29

Type Values Removed Values Added
References () http://developer.pidgin.im/viewmtn/revision/diff/5c2dba4a7e2e76b76e7f472b88953a4316706d43/with/16af0661899a978b4fedc1c165965b85009013d1/libpurple/protocols/msn/httpconn.c - Patch () http://developer.pidgin.im/viewmtn/revision/diff/5c2dba4a7e2e76b76e7f472b88953a4316706d43/with/16af0661899a978b4fedc1c165965b85009013d1/libpurple/protocols/msn/httpconn.c - Patch
References () http://developer.pidgin.im/viewmtn/revision/info/16af0661899a978b4fedc1c165965b85009013d1 - Patch () http://developer.pidgin.im/viewmtn/revision/info/16af0661899a978b4fedc1c165965b85009013d1 - Patch
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-August/064943.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-August/064943.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065190.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065190.html -
References () http://pidgin.im/news/security/?id=54 - Patch, Vendor Advisory () http://pidgin.im/news/security/?id=54 - Patch, Vendor Advisory
References () http://secunia.com/advisories/45663 - Vendor Advisory () http://secunia.com/advisories/45663 - Vendor Advisory
References () http://secunia.com/advisories/45916 - () http://secunia.com/advisories/45916 -
References () http://securitytracker.com/id?1025961 - () http://securitytracker.com/id?1025961 -
References () http://www.openwall.com/lists/oss-security/2011/08/22/10 - () http://www.openwall.com/lists/oss-security/2011/08/22/10 -
References () http://www.openwall.com/lists/oss-security/2011/08/22/12 - () http://www.openwall.com/lists/oss-security/2011/08/22/12 -
References () http://www.openwall.com/lists/oss-security/2011/08/22/4 - () http://www.openwall.com/lists/oss-security/2011/08/22/4 -
References () http://www.openwall.com/lists/oss-security/2011/08/22/7 - () http://www.openwall.com/lists/oss-security/2011/08/22/7 -
References () http://www.securityfocus.com/bid/49268 - () http://www.securityfocus.com/bid/49268 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=732405 - () https://bugzilla.redhat.com/show_bug.cgi?id=732405 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/69341 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/69341 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18284 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18284 -

Information

Published : 2011-08-29 17:55

Updated : 2024-11-21 01:29


NVD link : CVE-2011-3184

Mitre link : CVE-2011-3184

CVE.ORG link : CVE-2011-3184


JSON object : View

Products Affected

pidgin

  • pidgin
CWE
CWE-399

Resource Management Errors