Skip to main content

Pidgin MXit Message Parsing Buffer Overflow Vulnerability

Last Update Date: 10 Jul 2012 Release Date: 9 Jul 2012 4867 Views

RISK: Medium Risk

TYPE: Clients - Im, Chat & Voip

TYPE: Im, Chat & Voip

A vulnerability has been identified in Pidgin, which can be exploited by malicious people to compromise a user's system.

 
The vulnerability is caused due to a boundary error within the "mxit_show_message()" function (libpurple/protocols/mxit/markup.c) when parsing incoming messages containing inline images. This can be exploited to cause a stack-based buffer overflow via a specially crafted RX message.

Impact

  • Remote Code Execution

System / Technologies affected

  • Pidgin 2.x

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

  • Update to version 2.10.5.

Vulnerability Identifier


Source


Related Link