Bug 521832 (CVE-2009-3083)
Summary: | CVE-2009-3083 Pidgin: NULL pointer dereference by processing incomplete MSN SLP invite (DoS) | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Jan Lieskovsky <jlieskov> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | kreilly, mjc, wtogami |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://pidgin.im/news/security/?id=39 | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2010-03-29 09:11:29 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 522536, 522537, 522538, 522539, 529416, 833962 | ||
Bug Blocks: |
Description
Jan Lieskovsky
2009-09-08 13:40:23 UTC
This issue affects the versions of Pidgin package, as shipped with Red Hat Enterprise Linux 3, 4, and 5. This issue was already addressed in the versions of Pidgin package, as shipped with Fedora 10 and 11. Relevant versions: Fedora 10: pidgin-2.6.2-1.fc10.1 Fedora 11: pidgin-2.6.2-1.fc11 Common Vulnerabilities and Exposures assigned an identifier CVE-2009-3083 to the following vulnerability: The msn_slp_sip_recv function in libpurple/protocols/msn/slp.c in the MSN protocol plugin in libpurple in Pidgin before 2.6.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an SLP invite message that lacks certain required fields, as demonstrated by a malformed message from a KMess client. References: ----------- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3083 http://developer.pidgin.im/ticket/10159 http://developer.pidgin.im/viewmtn/revision/diff/6d3fc30a0a0a379281efc5a6872a9c1d7c24c650 http://developer.pidgin.im/viewmtn/revision/info/b4a95ea62b81a06ffc1993912471c511b786efdd http://www.pidgin.im/news/security/index.php?id=39 http://www.securityfocus.com/bid/36277 http://secunia.com/advisories/36601 This issue has been addressed in following products: Red Hat Enterprise Linux 4 Red Hat Enterprise Linux 5 Via RHSA-2009:1453 https://rhn.redhat.com/errata/RHSA-2009-1453.html This issue has been addressed in following products: Red Hat Enterprise Linux 3 Via RHSA-2009:1535 https://rhn.redhat.com/errata/RHSA-2009-1535.html |