Bug 732405 (CVE-2011-3184)

Summary: CVE-2011-3184 pidgin: Remote crash in MSN protocol plugin
Product: [Other] Security Response Reporter: Huzaifa S. Sidhpurwala <huzaifas>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: unspecifiedCC: bressers, daniel_atallah, deryni, eblanton, fedora, itamar, jrb, lschiere+bugs, mark, mbarnes, stu
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-08-22 10:45:55 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Huzaifa S. Sidhpurwala 2011-08-22 10:36:02 UTC
 A flaw was found in the handling of HTTP 100 responses in the MSN protocol plugin. It can cause the application to attempt to access memory that it does not have access to. This only affects users who have turned on the HTTP connection method for their accounts (it's off by default). This might only be triggerable by a malicious server and not a malicious peer. Remote code execution is not possible.

Reference:
http://pidgin.im/news/security/?id=54

Comment 1 Huzaifa S. Sidhpurwala 2011-08-22 10:45:55 UTC
This flaw requires a malicious MSN server to actually crash the pidgin client.
Also upstream has confirmed that this is crash only and remote code execution is not possible.

Closing this as not a security flaw.

Comment 2 Josh Bressers 2011-08-22 20:09:39 UTC
Statement:

Red Hat does not consider this to be a security flaw. As a malicious MSN server is needed, there are far worlse implications to a user connecting to an untrusted server than a DoS.