A Heap-based buffer overflow was found in SIMPLE protocol header parsing. A malicious server could provide a Content-Length header of '-1' which could lead to a buffer overlow. This could cause pidgin to crash or possibly execute arbitrary code with the permissions of the user running pidgin. Acknowledgements: Red Hat would like to thank the Pidgin project for reporting this issue. Upstream acknowledges Yves Younan of Sourcefire VRT as the original reporter of this issue.
Created attachment 855935 [details] Local copy of patch
External References: http://pidgin.im/news/security/?id=84
Created pidgin tracking bugs for this issue: Affects: fedora-all [bug 1059049]
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 Via RHSA-2014:0139 https://rhn.redhat.com/errata/RHSA-2014-0139.html
pidgin-2.10.9-1.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
pidgin-2.10.9-1.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.