4.3
CVSSv2

CVE-2008-2955

Published: 01/07/2008 Updated: 11/10/2018
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 435
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

Pidgin 2.4.1 allows remote malicious users to cause a denial of service (crash) via a long filename that contains certain characters, as demonstrated using an MSN message that triggers the crash in the msn_slplink_process_msg function.

Vulnerable Product Search on Vulmon Subscribe to Product

pidgin pidgin 2.4.1

Vendor Advisories

Synopsis Moderate: pidgin security and bug fix update Type/Severity Security Advisory: Moderate Topic Updated Pidgin packages that fix several security issues and bugs are nowavailable for Red Hat Enterprise Linux 4 and 5This update has been rated as having moderate security impact by the RedHat Security R ...
It was discovered that Pidgin did not properly handle certain topic messages in the IRC protocol handler If a user were tricked into connecting to a malicious IRC server, an attacker could cause Pidgin to crash, leading to a denial of service This issue only affected Ubuntu 804 LTS, Ubuntu 810 and Ubuntu 904 (CVE-2009-2703) ...
It was discovered that Pidgin did not properly handle certain malformed messages in the MSN protocol handler A remote attacker could send a specially crafted message and possibly execute arbitrary code with user privileges (CVE-2008-2927) ...

Exploits

source: wwwsecurityfocuscom/bid/33414/info Pidgin is prone to a denial-of-service vulnerability because it fails to properly sanitize user-supplied input Successful exploits will cause the affected application to crash, effectively denying service to legitimate users Pidgin 241 is vulnerable; other versions may also be affected NO ...