Page 13 of 64 results (0.008 seconds)

CVSS: 4.3EPSS: 9%CPEs: 29EXPL: 0

libpurple in Finch in Pidgin before 2.6.6, when an XMPP multi-user chat (MUC) room is used, does not properly parse nicknames containing <br> sequences, which allows remote attackers to cause a denial of service (application crash) via a crafted nickname. libpurple en Finch en Pidgin anterior a v2.6.6, cuando se usa un chat XMPP multi-usuario, no valida adecuadamente los alias (nicknames) que contienen la secuencia <br>, lo que permite a atacantes remotos provocar una denegación de servicio (caída de aplicación) mediante el alias. • http://developer.pidgin.im/wiki/ChangeLog http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035332.html http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035347.html http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035409.html http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html http://pidgin.im/news/security/?id=44 http://secunia.com/advisories/38563 http://secunia.com/advisories/38640 http://secunia.com/adv • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 22%CPEs: 29EXPL: 0

gtkimhtml.c in Pidgin before 2.6.6 allows remote attackers to cause a denial of service (CPU consumption and application hang) by sending many smileys in a (1) IM or (2) chat. gtkimhtml.c en Pidgin anterior a v2.6.6, permite a atacantes remotos provocar una denegación de servicio (consumo de CPU y cuelgue de aplicación) mediante el envío de varios smileys en una conversación de (1) IM o (2) chat. • http://developer.pidgin.im/wiki/ChangeLog http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035332.html http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035347.html http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035409.html http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html http://pidgin.im/news/security/?id=45 http://secunia.com/advisories/38563 http://secunia.com/advisories/38640 http://secunia.com/adv • CWE-399: Resource Management Errors •

CVSS: 5.0EPSS: 20%CPEs: 30EXPL: 0

slp.c in the MSN protocol plugin in libpurple in Pidgin before 2.6.6, including 2.6.4, and Adium 1.3.8 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed MSNSLP INVITE request in an SLP message, a different issue than CVE-2010-0013. El archivo slp.c en el plugin del protocolo MSN en la biblioteca libpurple en Pidgin anterior a versión 2.6.6, incluyendo la versión 2.6.4, y Adium versión 1.3.8, permite a los atacantes remotos causar una denegación de servicio (corrupción de memoria y bloqueo de aplicación) o posiblemente tener otro impacto no especificado por medio de una petición MSNSLP INVITE malformada en un mensaje SLP, un problema diferente de CVE-2010-0013. • http://blogs.sun.com/security/entry/cve_2010_0277_malformed_msn http://developer.pidgin.im/wiki/ChangeLog http://events.ccc.de/congress/2009/Fahrplan/events/3596.en.html http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035332.html http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035347.html http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035409.html http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html http:// • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 7%CPEs: 10EXPL: 1

Directory traversal vulnerability in slp.c in the MSN protocol plugin in libpurple in Pidgin 2.6.4 and Adium 1.3.8 allows remote attackers to read arbitrary files via a .. (dot dot) in an application/x-msnmsgrp2p MSN emoticon (aka custom smiley) request, a related issue to CVE-2004-0122. NOTE: it could be argued that this is resultant from a vulnerability in which an emoticon download request is processed even without a preceding text/x-mms-emoticon message that announced availability of the emoticon. Vulnerabilidad de salto de directorio en slp.c en el complemento del protocolo MSN en libpurple en Pidgin v2.6.4 y Adium v1.3.8 permite a atacantes remotos leer ficheros de su elección a través de un .. (punto punto) en una petición emoticono MSN application/x-msnmsgrp2p (también conocido como emoticono personalizado), un caso relaciona con CVE-2004-0122. • https://www.exploit-db.com/exploits/11203 http://d.pidgin.im/viewmtn/revision/info/3d02401cf232459fc80c0837d31e05fae7ae5467 http://d.pidgin.im/viewmtn/revision/info/4be2df4f72bd8a55cdae7f2554b73342a497c92f http://d.pidgin.im/viewmtn/revision/info/c64a1adc8bda2b4aeaae1f273541afbc4f71b810 http://developer.pidgin.im/viewmtn/revision/diff/3d02401cf232459fc80c0837d31e05fae7ae5467/with/c64a1adc8bda2b4aeaae1f273541afbc4f71b810/libpurple/protocols/msn/slp.c http://events.ccc.de/congress/2009/Fahrplan/events/3596.en.html http://lists.fedoraproject.org/piperma • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •