CVE Vulnerabilities

CVE-2009-1376

Published: May 26, 2009 | Modified: Apr 09, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
9.3 HIGH
AV:N/AC:M/Au:N/C:C/I:C/A:C
RedHat/V2
6 IMPORTANT
AV:N/AC:M/Au:S/C:P/I:P/A:P
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Multiple integer overflows in the msn_slplink_process_msg functions in the MSN protocol handler in (1) libpurple/protocols/msn/slplink.c and (2) libpurple/protocols/msnp9/slplink.c in Pidgin (formerly Gaim) before 2.5.6 on 32-bit platforms allow remote attackers to execute arbitrary code via a malformed SLP message with a crafted offset value, leading to buffer overflows. NOTE: this issue exists because of an incomplete fix for CVE-2008-2927.

Affected Software

NameVendorStart VersionEnd Version
PidginPidgin*2.5.5 (including)
PidginPidgin2.4.0-32_bit (including)2.4.0-32_bit (including)
PidginPidgin2.4.1-32_bit (including)2.4.1-32_bit (including)
PidginPidgin2.4.2-32_bit (including)2.4.2-32_bit (including)
PidginPidgin2.4.3-32_bit (including)2.4.3-32_bit (including)
PidginPidgin2.5.0-32_bit (including)2.5.0-32_bit (including)
PidginPidgin2.5.2-32_bit (including)2.5.2-32_bit (including)
PidginPidgin2.5.3-32_bit (including)2.5.3-32_bit (including)
PidginPidgin2.5.4-32_bit (including)2.5.4-32_bit (including)
Red Hat Enterprise Linux 3RedHatpidgin-0:1.5.1-3.el3*
Red Hat Enterprise Linux 4RedHatpidgin-0:2.5.5-2.el4*
Red Hat Enterprise Linux 5RedHatpidgin-0:2.5.5-3.el5*
GaimUbuntudapper*
GaimUbuntuupstream*
PidginUbuntuhardy*
PidginUbuntuintrepid*
PidginUbuntujaunty*
PidginUbuntuupstream*

References