A flaw was found in the MXit protocol plug-in. A malicious server or man-in-the-middle attacker could trigger this issue and cause Pidgin to crash by sending a specially-crafted emoticon. Acknowledgements: Name: the Pidgin project Upstream: Yves Younan (Cisco Talos), Richard Johnson (Cisco Talos)
Created attachment 948787 [details] patch from upstream
Public now: http://www.pidgin.im/news/security/?id=87
Created pidgin tracking bugs for this issue: Affects: fedora-all [bug 1155838]
pidgin-2.10.10-2.fc21 has been pushed to the Fedora 21 stable repository. If problems still persist, please make note of it in this bug report.
pidgin-2.10.10-1.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
Analysis ======== 1. In fuction, asn_getUtf8( const gchar* data, gsize data_len, gchar type, char** utf8 ) which is part of mxit protocol. { unsigned int len; gchar *out_str; ... 2. malloc and and memcpy is done without checking the length being passed, which is the length of the emoticon being sent or used which can cause crash by sending specially crafted emoticon. out_str = g_malloc(len + 1); memcpy(out_str, &data[2], len); /* data field */
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:1854 https://access.redhat.com/errata/RHSA-2017:1854