Bug 732405 - (CVE-2011-3184) CVE-2011-3184 pidgin: Remote crash in MSN protocol plugin
CVE-2011-3184 pidgin: Remote crash in MSN protocol plugin
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
unspecified Severity unspecified
: ---
: ---
Assigned To: Red Hat Product Security
public=20110820,reported=20110820,sou...
: Security
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2011-08-22 06:36 EDT by Huzaifa S. Sidhpurwala
Modified: 2015-08-19 05:12 EDT (History)
11 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2011-08-22 06:45:55 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:


Attachments (Terms of Use)

  None (edit)
Description Huzaifa S. Sidhpurwala 2011-08-22 06:36:02 EDT
 A flaw was found in the handling of HTTP 100 responses in the MSN protocol plugin. It can cause the application to attempt to access memory that it does not have access to. This only affects users who have turned on the HTTP connection method for their accounts (it's off by default). This might only be triggerable by a malicious server and not a malicious peer. Remote code execution is not possible.

Reference:
http://pidgin.im/news/security/?id=54
Comment 1 Huzaifa S. Sidhpurwala 2011-08-22 06:45:55 EDT
This flaw requires a malicious MSN server to actually crash the pidgin client.
Also upstream has confirmed that this is crash only and remote code execution is not possible.

Closing this as not a security flaw.
Comment 2 Josh Bressers 2011-08-22 16:09:39 EDT
Statement:

Red Hat does not consider this to be a security flaw. As a malicious MSN server is needed, there are far worlse implications to a user connecting to an untrusted server than a DoS.

Note You need to log in before you can comment on or make changes to this bug.