Format string vulnerability in the log_message_cb function in otr-plugin.c in the Off-the-Record Messaging (OTR) pidgin-otr plugin before 3.2.1 for Pidgin might allow remote attackers to execute arbitrary code via format string specifiers in data that generates a log message.
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Pidgin-otr | Cypherpunks | * | 3.2.0 (including) |
| Pidgin-otr | Ubuntu | hardy | * |
| Pidgin-otr | Ubuntu | lucid | * |
| Pidgin-otr | Ubuntu | natty | * |
| Pidgin-otr | Ubuntu | oneiric | * |
| Pidgin-otr | Ubuntu | precise | * |
| Pidgin-otr | Ubuntu | upstream | * |