SB2011110402 - Buffer overflow in pidgin.im libpurple
Published: November 4, 2011 Updated: August 11, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Buffer overflow (CVE-ID: CVE-2011-3594)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
The g_markup_escape_text function in the SILC protocol plug-in in libpurple 2.10.0 and earlier, as used in Pidgin and possibly other products, allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with certain versions of glib2.
Remediation
Install update from vendor's website.
References
- http://developer.pidgin.im/ticket/14636
- http://developer.pidgin.im/viewmtn/revision/diff/be5e66abad2af29604bc794cc4c6600ab12751f3/with/7eb1f6d56cc58bbb5b56b7df53955d36b9b419b8
- http://pidgin.im/news/security/?id=56
- http://secunia.com/advisories/46376
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:183
- http://www.redhat.com/support/errata/RHSA-2011-1371.html
- https://bugzilla.redhat.com/show_bug.cgi?id=743481
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18034