Pierre Noguès found a NULL pointer dereference in the Pidgin MSN SLP protocol implementation, by processing custom emoticon messages. A remote, authenticated user could use this deficiency to cause a denial of service (Pidgin crash). Acknowledgements: Red Hat would like to thank the Pidgin project for reporting this issue. Upstream acknowledges Pierre Noguès of Meta Security as the original reporter.
This issue affects the versions of the pidgin package, as shipped with Red Hat Enterprise Linux 3, 4, and 5. This issue affects the versions of the pidgin package, as shipped with Fedora release of 11 and 12.
This is CVE-2010-1624.
Upstream advisory: [1] http://pidgin.im/news/security/?id=46 Upstream commit: [2] http://developer.pidgin.im/viewmtn/revision/info/894460d22c434e73d60b71ec031611988e687c8b
Statement CVE-2010-1624: The Red Hat Security Response Team has rated this issue as having low security impact, a future pidgin package update may address this flaw in Red Hat Enterprise Linux 3, 4, and 5.
pidgin-2.7.0-1.fc13 has been submitted as an update for Fedora 13. http://admin.fedoraproject.org/updates/pidgin-2.7.0-1.fc13
pidgin-2.7.0-1.fc12 has been submitted as an update for Fedora 12. http://admin.fedoraproject.org/updates/pidgin-2.7.0-1.fc12
pidgin-2.7.0-1.fc11 has been submitted as an update for Fedora 11. http://admin.fedoraproject.org/updates/pidgin-2.7.0-1.fc11
pidgin-2.7.0-2.fc11 has been pushed to the Fedora 11 stable repository. If problems still persist, please make note of it in this bug report.
pidgin-2.7.0-2.fc13 has been pushed to the Fedora 13 stable repository. If problems still persist, please make note of it in this bug report.
pidgin-2.7.0-2.fc12 has been pushed to the Fedora 12 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in following products: Red Hat Enterprise Linux 4 Red Hat Enterprise Linux 5 Via RHSA-2010:0788 https://rhn.redhat.com/errata/RHSA-2010-0788.html