CVE-2011-3185

gtkutils.c in Pidgin before 2.10.0 on Windows allows user-assisted remote attackers to execute arbitrary programs via a file: URL in a message.
References
Link Resource
http://developer.pidgin.im/viewmtn/revision/diff/29484df15413fe3bbd21bbfcef26a55362055a81/with/5749f9193063800d27bef75c2388f6f9cc2f7f37/pidgin/gtkutils.c Patch
http://developer.pidgin.im/viewmtn/revision/info/5749f9193063800d27bef75c2388f6f9cc2f7f37 Patch
http://pidgin.im/news/security/?id=55 Patch Vendor Advisory
http://secunia.com/advisories/45663 Vendor Advisory
http://securitytracker.com/id?1025961
http://www.insomniasec.com/advisories/ISVA-110822.1.htm
http://www.openwall.com/lists/oss-security/2011/08/22/
http://www.openwall.com/lists/oss-security/2011/08/22/10
http://www.openwall.com/lists/oss-security/2011/08/22/12
http://www.openwall.com/lists/oss-security/2011/08/22/7
http://www.securityfocus.com/archive/1/519391/100/0/threaded
http://www.securityfocus.com/bid/49268
https://exchange.xforce.ibmcloud.com/vulnerabilities/69342
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18324
http://developer.pidgin.im/viewmtn/revision/diff/29484df15413fe3bbd21bbfcef26a55362055a81/with/5749f9193063800d27bef75c2388f6f9cc2f7f37/pidgin/gtkutils.c Patch
http://developer.pidgin.im/viewmtn/revision/info/5749f9193063800d27bef75c2388f6f9cc2f7f37 Patch
http://pidgin.im/news/security/?id=55 Patch Vendor Advisory
http://secunia.com/advisories/45663 Vendor Advisory
http://securitytracker.com/id?1025961
http://www.insomniasec.com/advisories/ISVA-110822.1.htm
http://www.openwall.com/lists/oss-security/2011/08/22/
http://www.openwall.com/lists/oss-security/2011/08/22/10
http://www.openwall.com/lists/oss-security/2011/08/22/12
http://www.openwall.com/lists/oss-security/2011/08/22/7
http://www.securityfocus.com/archive/1/519391/100/0/threaded
http://www.securityfocus.com/bid/49268
https://exchange.xforce.ibmcloud.com/vulnerabilities/69342
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18324
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
OR cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:29

Type Values Removed Values Added
References () http://developer.pidgin.im/viewmtn/revision/diff/29484df15413fe3bbd21bbfcef26a55362055a81/with/5749f9193063800d27bef75c2388f6f9cc2f7f37/pidgin/gtkutils.c - Patch () http://developer.pidgin.im/viewmtn/revision/diff/29484df15413fe3bbd21bbfcef26a55362055a81/with/5749f9193063800d27bef75c2388f6f9cc2f7f37/pidgin/gtkutils.c - Patch
References () http://developer.pidgin.im/viewmtn/revision/info/5749f9193063800d27bef75c2388f6f9cc2f7f37 - Patch () http://developer.pidgin.im/viewmtn/revision/info/5749f9193063800d27bef75c2388f6f9cc2f7f37 - Patch
References () http://pidgin.im/news/security/?id=55 - Patch, Vendor Advisory () http://pidgin.im/news/security/?id=55 - Patch, Vendor Advisory
References () http://secunia.com/advisories/45663 - Vendor Advisory () http://secunia.com/advisories/45663 - Vendor Advisory
References () http://securitytracker.com/id?1025961 - () http://securitytracker.com/id?1025961 -
References () http://www.insomniasec.com/advisories/ISVA-110822.1.htm - () http://www.insomniasec.com/advisories/ISVA-110822.1.htm -
References () http://www.openwall.com/lists/oss-security/2011/08/22/ - () http://www.openwall.com/lists/oss-security/2011/08/22/ -
References () http://www.openwall.com/lists/oss-security/2011/08/22/10 - () http://www.openwall.com/lists/oss-security/2011/08/22/10 -
References () http://www.openwall.com/lists/oss-security/2011/08/22/12 - () http://www.openwall.com/lists/oss-security/2011/08/22/12 -
References () http://www.openwall.com/lists/oss-security/2011/08/22/7 - () http://www.openwall.com/lists/oss-security/2011/08/22/7 -
References () http://www.securityfocus.com/archive/1/519391/100/0/threaded - () http://www.securityfocus.com/archive/1/519391/100/0/threaded -
References () http://www.securityfocus.com/bid/49268 - () http://www.securityfocus.com/bid/49268 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/69342 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/69342 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18324 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18324 -

Information

Published : 2011-08-29 17:55

Updated : 2024-11-21 01:29


NVD link : CVE-2011-3185

Mitre link : CVE-2011-3185

CVE.ORG link : CVE-2011-3185


JSON object : View

Products Affected

pidgin

  • pidgin

microsoft

  • windows
CWE
CWE-20

Improper Input Validation