6.4
CVSSv2

CVE-2008-2957

Published: 01/07/2008 Updated: 29/09/2017
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P

Vulnerability Summary

The UPnP functionality in Pidgin 2.0.0, and possibly other versions, allows remote malicious users to trigger the download of arbitrary files and cause a denial of service (memory or disk consumption) via a UDP packet that specifies an arbitrary URL.

Vulnerable Product Search on Vulmon Subscribe to Product

pidgin pidgin 2.0.0

Vendor Advisories

Synopsis Moderate: pidgin security and bug fix update Type/Severity Security Advisory: Moderate Topic Updated Pidgin packages that fix several security issues and bugs are nowavailable for Red Hat Enterprise Linux 4 and 5This update has been rated as having moderate security impact by the RedHat Security R ...
Debian Bug report logs - #488632 pidgin: Few security flaws Package: pidgin; Maintainer for pidgin is Ari Pollak <ari@debianorg>; Source for pidgin is src:pidgin (PTS, buildd, popcon) Reported by: Steffen Joeris <steffenjoeris@skolelinuxde> Date: Mon, 30 Jun 2008 08:36:02 UTC Severity: important Tags: fixed-upstr ...
It was discovered that Pidgin did not properly handle certain malformed messages in the MSN protocol handler A remote attacker could send a specially crafted message and possibly execute arbitrary code with user privileges (CVE-2008-2927) ...