Page 10 of 74 results (0.008 seconds)

CVSS: 5.0EPSS: 1%CPEs: 48EXPL: 1

msg.c in the MSN protocol plugin in libpurple in Pidgin before 2.10.4 does not properly handle crafted characters, which allows remote servers to cause a denial of service (application crash) by placing these characters in a text/plain message. msg.c en el plugin del protocolo MSN en libpurple en Pidgin antes de v2.10.4 no trata correctamente los caracteres hechos a mano, lo que permite a servidores remotos provocar una denegación de servicio (caída de la aplicación) mediante la colocación de estos caracteres en un mensaje de texto plano (text/plain). • http://hg.pidgin.im/pidgin/main/rev/4d6bcb4f4ea4 http://pidgin.im/news/security/?id=63 http://rhn.redhat.com/errata/RHSA-2012-1102.html http://secunia.com/advisories/50005 http://www.mandriva.com/security/advisories?name=MDVSA-2012:082 http://www.securityfocus.com/bid/53400 https://hermes.opensuse.org/messages/15136503 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17448 https://access.redhat.com/security/cve/CVE-2012-2318 https://b • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 1%CPEs: 46EXPL: 0

The msn_oim_report_to_user function in oim.c in the MSN protocol plugin in libpurple in Pidgin before 2.10.2 allows remote servers to cause a denial of service (application crash) via an OIM message that lacks UTF-8 encoding. La función de msn_oim_report_to_user oim.c en el plugin del protocolo MSN en libpurple en Pidgin antes de v2.10.2 permite a los servidores remotos provocar una denegación de servicio (caída de aplicación) a través de un mensaje de la OIM que carece de codificación UTF-8. • http://developer.pidgin.im/ticket/14884 http://developer.pidgin.im/viewmtn/revision/diff/60f8379d0a610538cf42e0dd9ab1436c8b9308cd/with/3053d6a37cc6d8774aba7607b992a4408216adcd/libpurple/protocols/msn/oim.c http://developer.pidgin.im/viewmtn/revision/info/3053d6a37cc6d8774aba7607b992a4408216adcd http://pidgin.im/news/security/?id=61 http://rhn.redhat.com/errata/RHSA-2012-1102.html http://secunia.com/advisories/50005 http://www.mandriva.com/security/advisories?name=MDVSA-2012:029 http://www.securityfocus.com/bid/52475 htt • CWE-399: Resource Management Errors •

CVSS: 6.4EPSS: 1%CPEs: 46EXPL: 0

The pidgin_conv_chat_rename_user function in gtkconv.c in Pidgin before 2.10.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) by changing a nickname while in an XMPP chat room. La función de pidgin_conv_chat_rename_user gtkconv.c en Pidgin antes de v2.10.2 permite a atacantes remotos causar una denegación de servicio (eliminar la referencia del puntero NULL y caída de aplicación), cambiando un apodo mientras se encuentra en una sala de chat XMPP. • http://developer.pidgin.im/ticket/14392 http://developer.pidgin.im/viewmtn/revision/diff/10ead4688e3af4132d454fa3bc241480500651c9/with/d1d77da56217f3a083e1d459bef054db9f1d5699/pidgin/gtkconv.c http://developer.pidgin.im/viewmtn/revision/info/d1d77da56217f3a083e1d459bef054db9f1d5699 http://pidgin.im/news/security/?id=60 http://www.mandriva.com/security/advisories?name=MDVSA-2012:029 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18406 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.0EPSS: 2%CPEs: 45EXPL: 0

The silc_channel_message function in ops.c in the SILC protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted message, a different vulnerability than CVE-2011-3594. La función silc_channel_message de ops.c del complemento del protocolo SILC de libpurple de Pidgin en versiones anteriores 2.10.1 no realiza la validación prevista UTF-8 en los datos del mensaje, lo que permite a atacantes remotos provocar una denegación de servicio (caída de la aplicación) a través de un mensaje modificado. Una vulnerabilidad distinta a la CVE-2011-3594. • http://developer.pidgin.im/viewmtn/revision/diff/c7b95cc3be0590b52edc02d4750ae62844c1acb6/with/afb9ede3de989f217f03d5670cca00e628bd11f1/libpurple/protocols/silc/ops.c http://developer.pidgin.im/viewmtn/revision/info/afb9ede3de989f217f03d5670cca00e628bd11f1 http://secunia.com/advisories/47234 http://www.pidgin.im/news/security/?id=59 http://www.redhat.com/support/errata/RHSA-2011-1820.html http://www.securityfocus.com/bid/51074 https://hermes.opensuse.org/messages/13195955 https://oval.cisecurity.org/repository/search/definiti • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 2%CPEs: 45EXPL: 0

The XMPP protocol plugin in libpurple in Pidgin before 2.10.1 does not properly handle missing fields in (1) voice-chat and (2) video-chat stanzas, which allows remote attackers to cause a denial of service (application crash) via a crafted message. El complemento del protocolo XMPP de libpurple de Pidgin en versiones anteriores a 2.10.1 no maneja apropiadamente campos faltantes en párrafos (1) voice-chat y (2) video-chat, lo que permite a atacantes remotos provocar una denegación de servicio (caída de la aplicación) a través de un mensaje modificado. • http://developer.pidgin.im/viewmtn/revision/info/fb216fc88b085afc06d9a15209519cde1f4df6c6 http://pidgin.im/news/security/?id=58 http://secunia.com/advisories/47219 http://secunia.com/advisories/47234 http://www.redhat.com/support/errata/RHSA-2011-1820.html http://www.redhat.com/support/errata/RHSA-2011-1821.html https://hermes.opensuse.org/messages/13195955 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18420 https://access.redhat.com/security/cve/CVE- • CWE-20: Improper Input Validation •