Multiple integer overflows in the msn_slplink_process_msg functions in the MSN protocol handler in (1) libpurple/protocols/msn/slplink.c and (2) libpurple/protocols/msnp9/slplink.c in Pidgin (formerly Gaim) prior to 2.5.6 on 32-bit platforms allow remote malicious users to execute arbitrary code via a malformed SLP message with a crafted offset value, leading to buffer overflows. NOTE: this issue exists because of an incomplete fix for CVE-2008-2927.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
pidgin pidgin 2.5.2 |
||
pidgin pidgin 2.5.3 |
||
pidgin pidgin 2.5.0 |
||
pidgin pidgin 2.4.2 |
||
pidgin pidgin |
||
pidgin pidgin 2.4.0 |
||
pidgin pidgin 2.4.3 |
||
pidgin pidgin 2.5.4 |
||
pidgin pidgin 2.4.1 |