Computer Security
[EN] securityvulns.ru no-pyccku


Pidgin code execution
Published:30.08.2011
Source:
SecurityVulns ID:11884
Type:remote
Threat Level:
6/10
Description:It's possible to execute code via file:// URL
Affected:PIDGIN : Pidgin 2.9
CVE:CVE-2011-3185 (gtkutils.c in Pidgin before 2.10.0 on Windows allows user-assisted remote attackers to execute arbitrary programs via a file: URL in a message.)
 CVE-2011-3184 (The msn_httpconn_parse_data function in httpconn.c in the MSN protocol plugin in libpurple in Pidgin before 2.10.0 does not properly handle HTTP 100 responses, which allows remote attackers to cause a denial of service (incorrect memory access and application crash) via vectors involving a crafted server message.)
 CVE-2011-2943 (The irc_msg_who function in msgs.c in the IRC protocol plugin in libpurple 2.8.0 through 2.9.0 in Pidgin before 2.10.0 does not properly validate characters in nicknames, which allows user-assisted remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted nickname that is not properly handled in a WHO response.)
Original documentdocumentInsomnia Security, Insomnia : ISVA-110822.1 - Pidgin IM Insecure URL Handling Remote Code Execution (30.08.2011)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod