Pidgin MXit Message Parsing Buffer Overflow Vulnerability
Last Update Date:
10 Jul 2012
Release Date:
9 Jul 2012
4867
Views
RISK: Medium Risk
TYPE: Clients - Im, Chat & Voip
A vulnerability has been identified in Pidgin, which can be exploited by malicious people to compromise a user's system.
The vulnerability is caused due to a boundary error within the "mxit_show_message()" function (libpurple/protocols/mxit/markup.c) when parsing incoming messages containing inline images. This can be exploited to cause a stack-based buffer overflow via a specially crafted RX message.
Impact
- Remote Code Execution
System / Technologies affected
- Pidgin 2.x
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Update to version 2.10.5.
Vulnerability Identifier
Source
Related Link
Share with