Total vulnerabilities in the database
Multiple integer overflows in the msn_slplink_process_msg functions in the MSN protocol handler in (1) libpurple/protocols/msn/slplink.c and (2) libpurple/protocols/msnp9/slplink.c in Pidgin (formerly Gaim) before 2.5.6 on 32-bit platforms allow remote attackers to execute arbitrary code via a malformed SLP message with a crafted offset value, leading to buffer overflows. NOTE: this issue exists because of an incomplete fix for CVE-2008-2927.
Software | From | Fixed in |
---|---|---|
pidgin / pidgin | 2.5.2-32_bit | 2.5.2-32_bit.x |
pidgin / pidgin | 2.5.3-32_bit | 2.5.3-32_bit.x |
pidgin / pidgin | 2.5.0-32_bit | 2.5.0-32_bit.x |
pidgin / pidgin | 2.4.2-32_bit | 2.4.2-32_bit.x |
pidgin / pidgin | - | 2.5.5.x |
pidgin / pidgin | 2.4.0-32_bit | 2.4.0-32_bit.x |
pidgin / pidgin | 2.4.3-32_bit | 2.4.3-32_bit.x |
pidgin / pidgin | 2.5.4-32_bit | 2.5.4-32_bit.x |
pidgin / pidgin | 2.4.1-32_bit | 2.4.1-32_bit.x |