CVE-2009-3084Improper Input Validation in Pidgin

Severity
5.0MEDIUMNVD
EPSS
1.4%
top 19.64%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 8
Latest updateMay 2

Description

The msn_slp_process_msg function in libpurple/protocols/msn/slpcall.c in the MSN protocol plugin in libpurple 2.6.0 and 2.6.1, as used in Pidgin before 2.6.2, allows remote attackers to cause a denial of service (application crash) via a handwritten (aka Ink) message, related to an uninitialized variable and the incorrect "UTF16-LE" charset name.

CVSS vector

AV:N/AC:L/C:N/I:N/A:PExploitability: 10.0 | Impact: 2.9

Affected Packages4 packages

NVDpidgin/libpurple2.6.0, 2.6.1+1
debiandebian/pidgin< pidgin 2.6.2-1 (bookworm)
Debianpidgin/pidgin< 2.6.2-1+3
NVDpidgin/pidgin2.6.1+25

Patches

🔴Vulnerability Details

2
GHSA
GHSA-7pmp-xp53-4j98: The msn_slp_process_msg function in libpurple/protocols/msn/slpcall2022-05-02
OSV
CVE-2009-3084: The msn_slp_process_msg function in libpurple/protocols/msn/slpcall2009-09-08

📋Vendor Advisories

2
Debian
CVE-2009-3084: pidgin - The msn_slp_process_msg function in libpurple/protocols/msn/slpcall.c in the MSN...2009
Red Hat
CVE-2009-3084: The msn_slp_process_msg function in libpurple/protocols/msn/slpcall