CVE-2011-2943Pidgin vulnerability

8 documents7 sources
Severity
4.3MEDIUMNVD
EPSS
4.0%
top 11.63%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 29
Latest updateMay 17

Description

The irc_msg_who function in msgs.c in the IRC protocol plugin in libpurple 2.8.0 through 2.9.0 in Pidgin before 2.10.0 does not properly validate characters in nicknames, which allows user-assisted remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted nickname that is not properly handled in a WHO response.

CVSS vector

AV:N/AC:M/C:N/I:N/A:PExploitability: 8.6 | Impact: 2.9

Affected Packages4 packages

NVDpidgin/libpurple2.8.0, 2.9.0+1
debiandebian/pidgin< pidgin 2.10.0-1 (bookworm)
Debianpidgin/pidgin< 2.10.0-1+3
NVDpidgin/pidgin2.9.0+43

Patches

🔴Vulnerability Details

2
GHSA
GHSA-39wr-cgvv-f2w7: The irc_msg_who function in msgs2022-05-17
OSV
CVE-2011-2943: The irc_msg_who function in msgs2011-08-29

📋Vendor Advisories

2
Red Hat
pidgin: Crash in IRC protocol plug-in by listing set of users (/who command) upon session startup2011-07-20
Debian
CVE-2011-2943: pidgin - The irc_msg_who function in msgs.c in the IRC protocol plugin in libpurple 2.8.0...2011

💬Community

2
Bugzilla
CVE-2011-2943 pidgin: Crash in IRC protocol plug-in by listing set of users (/who command) upon session startup [fedora-all]2011-08-22
Bugzilla
CVE-2011-2943 pidgin: Crash in IRC protocol plug-in by listing set of users (/who command) upon session startup2011-07-18