Resource management error in pidgin.im Pidgin



| Updated: 2020-08-11
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2011-3184
CWE-ID CWE-399
Exploitation vector Network
Public exploit N/A
Vulnerable software
Pidgin
Client/Desktop applications / Messaging software

Vendor pidgin.im

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Resource management error

EUVDB-ID: #VU44767

Risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2011-3184

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The msn_httpconn_parse_data function in httpconn.c in the MSN protocol plugin in libpurple in Pidgin before 2.10.0 does not properly handle HTTP 100 responses, which allows remote attackers to cause a denial of service (incorrect memory access and application crash) via vectors involving a crafted server message.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Pidgin: 2.0.0 - 2.8.0

CPE2.3 External links

https://developer.pidgin.im/viewmtn/revision/diff/5c2dba4a7e2e76b76e7f472b88953a4316706d43/with/16af0661899a978b4fedc1c165965b85009013d1/libpurple/protocols/msn/httpconn.c
https://developer.pidgin.im/viewmtn/revision/info/16af0661899a978b4fedc1c165965b85009013d1
https://lists.fedoraproject.org/pipermail/package-announce/2011-August/064943.html
https://lists.fedoraproject.org/pipermail/package-announce/2011-September/065190.html
https://pidgin.im/news/security/?id=54
https://secunia.com/advisories/45663
https://secunia.com/advisories/45916
https://securitytracker.com/id?1025961
https://www.openwall.com/lists/oss-security/2011/08/22/10
https://www.openwall.com/lists/oss-security/2011/08/22/12
https://www.openwall.com/lists/oss-security/2011/08/22/4
https://www.openwall.com/lists/oss-security/2011/08/22/7
https://www.securityfocus.com/bid/49268
https://bugzilla.redhat.com/show_bug.cgi?id=732405
https://exchange.xforce.ibmcloud.com/vulnerabilities/69341
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18284


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###