Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
Severity
10.0CRITICALNVD
OSV9.3
EPSS
34.7%
top 2.97%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedAug 21
Latest updateMay 2

Description

The msn_slplink_process_msg function in libpurple/protocols/msn/slplink.c in libpurple, as used in Pidgin (formerly Gaim) before 2.5.9 and Adium 1.3.5 and earlier, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) by sending multiple crafted SLP (aka MSNSLP) messages to trigger an overwrite of an arbitrary memory location. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-1376.

CVSS vector

AV:N/AC:L/C:C/I:C/A:CExploitability: 10.0 | Impact: 10.0

Affected Packages4 packages

debiandebian/pidgin< pidgin 2.5.9-1 (bookworm)
Debianpidgin/pidgin< 2.5.9-1+3
NVDadium/adium1.3.5+6
NVDpidgin/pidgin2.5.8+21

Patches

🔴Vulnerability Details

2
GHSA
GHSA-gg6v-c4q4-582f: The msn_slplink_process_msg function in libpurple/protocols/msn/slplink2022-05-02
OSV
CVE-2009-2694: The msn_slplink_process_msg function in libpurple/protocols/msn/slplink2009-08-21

💥Exploits & PoCs

1
Exploit-DB
Pidgin MSN 2.5.8 - Remote Code Execution2009-09-09

📋Vendor Advisories

3
Ubuntu
Pidgin vulnerability2009-08-20
Red Hat
pidgin: insufficient input validation in msn_slplink_process_msg()2009-08-18
Debian
CVE-2009-2694: pidgin - The msn_slplink_process_msg function in libpurple/protocols/msn/slplink.c in lib...2009

📐Framework References

1
CWE
Use of Out-of-range Pointer Offset

💬Community

1
Bugzilla
CVE-2009-2694 pidgin: insufficient input validation in msn_slplink_process_msg()2009-07-31