Page 11 of 90 results (0.009 seconds)

CVSS: 6.4EPSS: 1%CPEs: 46EXPL: 0

The pidgin_conv_chat_rename_user function in gtkconv.c in Pidgin before 2.10.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) by changing a nickname while in an XMPP chat room. La función de pidgin_conv_chat_rename_user gtkconv.c en Pidgin antes de v2.10.2 permite a atacantes remotos causar una denegación de servicio (eliminar la referencia del puntero NULL y caída de aplicación), cambiando un apodo mientras se encuentra en una sala de chat XMPP. • http://developer.pidgin.im/ticket/14392 http://developer.pidgin.im/viewmtn/revision/diff/10ead4688e3af4132d454fa3bc241480500651c9/with/d1d77da56217f3a083e1d459bef054db9f1d5699/pidgin/gtkconv.c http://developer.pidgin.im/viewmtn/revision/info/d1d77da56217f3a083e1d459bef054db9f1d5699 http://pidgin.im/news/security/?id=60 http://www.mandriva.com/security/advisories?name=MDVSA-2012:029 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18406 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.0EPSS: 2%CPEs: 45EXPL: 0

The silc_channel_message function in ops.c in the SILC protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted message, a different vulnerability than CVE-2011-3594. La función silc_channel_message de ops.c del complemento del protocolo SILC de libpurple de Pidgin en versiones anteriores 2.10.1 no realiza la validación prevista UTF-8 en los datos del mensaje, lo que permite a atacantes remotos provocar una denegación de servicio (caída de la aplicación) a través de un mensaje modificado. Una vulnerabilidad distinta a la CVE-2011-3594. • http://developer.pidgin.im/viewmtn/revision/diff/c7b95cc3be0590b52edc02d4750ae62844c1acb6/with/afb9ede3de989f217f03d5670cca00e628bd11f1/libpurple/protocols/silc/ops.c http://developer.pidgin.im/viewmtn/revision/info/afb9ede3de989f217f03d5670cca00e628bd11f1 http://secunia.com/advisories/47234 http://www.pidgin.im/news/security/?id=59 http://www.redhat.com/support/errata/RHSA-2011-1820.html http://www.securityfocus.com/bid/51074 https://hermes.opensuse.org/messages/13195955 https://oval.cisecurity.org/repository/search/definiti • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 2%CPEs: 45EXPL: 0

The XMPP protocol plugin in libpurple in Pidgin before 2.10.1 does not properly handle missing fields in (1) voice-chat and (2) video-chat stanzas, which allows remote attackers to cause a denial of service (application crash) via a crafted message. El complemento del protocolo XMPP de libpurple de Pidgin en versiones anteriores a 2.10.1 no maneja apropiadamente campos faltantes en párrafos (1) voice-chat y (2) video-chat, lo que permite a atacantes remotos provocar una denegación de servicio (caída de la aplicación) a través de un mensaje modificado. • http://developer.pidgin.im/viewmtn/revision/info/fb216fc88b085afc06d9a15209519cde1f4df6c6 http://pidgin.im/news/security/?id=58 http://secunia.com/advisories/47219 http://secunia.com/advisories/47234 http://www.redhat.com/support/errata/RHSA-2011-1820.html http://www.redhat.com/support/errata/RHSA-2011-1821.html https://hermes.opensuse.org/messages/13195955 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18420 https://access.redhat.com/security/cve/CVE- • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 7%CPEs: 45EXPL: 0

family_feedbag.c in the oscar protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted (1) AIM or (2) ICQ message associated with buddy-list addition. family_feedbag.c en el protocolo oscar en el plugin libpurple en Pidgin anterior a v2.10.1 no lleva a cabo la validación UTF-8 en los mensajes de datos, lo que permite a atacantes remotos provocar una denegación de servicio (caída de aplicación) a través de un mensaje elaborado (1) AIM o (2) ICQ asociado con la adición de lista de amigos. • http://developer.pidgin.im/viewmtn/revision/diff/bc79b1bf09dcfa1d8edac86a06761fce7416e69c/with/757272a78a8ca6027d518e614712c3399e34dda3/libpurple/protocols/oscar/family_feedbag.c http://developer.pidgin.im/viewmtn/revision/info/757272a78a8ca6027d518e614712c3399e34dda3 http://pidgin.im/news/security/?id=57 http://secunia.com/advisories/47219 http://secunia.com/advisories/47234 http://www.mandriva.com/security/advisories?name=MDVSA-2011:183 http://www.openwall.com/lists/oss-security/2011/12/10/1 http://www.openwall.com/ • CWE-20: Improper Input Validation •

CVSS: 4.3EPSS: 5%CPEs: 48EXPL: 1

The g_markup_escape_text function in the SILC protocol plug-in in libpurple 2.10.0 and earlier, as used in Pidgin and possibly other products, allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with certain versions of glib2. La función g_markup_escape_text en el complemento de protocolo SILC en libpurple v2.10.0 y anteriores, como se usa en Pidgin y posiblemente en otros productos, permite a atacantes remotos provocar una denegación de servicio (caída) a través de secuencias UTF-8 inválidas que disparan el uso de punteros no válidos y lectura fuera de los límites, relacionado con interacciones con ciertas versiones de glib2 • http://developer.pidgin.im/ticket/14636 http://developer.pidgin.im/viewmtn/revision/diff/be5e66abad2af29604bc794cc4c6600ab12751f3/with/7eb1f6d56cc58bbb5b56b7df53955d36b9b419b8 http://pidgin.im/news/security/?id=56 http://secunia.com/advisories/46376 http://www.mandriva.com/security/advisories?name=MDVSA-2011:183 http://www.redhat.com/support/errata/RHSA-2011-1371.html https://bugzilla.redhat.com/show_bug.cgi?id=743481 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18034 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •