Page 6 of 73 results (0.007 seconds)

CVSS: 7.5EPSS: 2%CPEs: 14EXPL: 0

Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg) parser in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a large Content-Length value, which triggers a buffer overflow. Desbordamiento de entero en libpurple/protocols/gg/lib/http.c en el analizador Gadu-Gadu (gg) en Pidgin anterior a 2.10.8 permite a atacantes remotos tener un impacto no especificado a través de un valor Content-Length largo, lo que provoca un desbordamiento de buffer. • http://advisories.mageia.org/MGASA-2014-0074.html http://hg.pidgin.im/pidgin/main/rev/ec15aa187aa0 http://libgadu.net/releases/1.11.3.html http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128277.html http://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html http://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html http://vrt-blog.snort.org/2014/01/vrt-2013-1001-cve-2013-6487-buffer.html http://www.debian.org/security/2014/dsa-2852 http: • CWE-122: Heap-based Buffer Overflow CWE-189: Numeric Errors •

CVSS: 5.0EPSS: 3%CPEs: 53EXPL: 0

libpurple/protocols/yahoo/libymsg.c in Pidgin before 2.10.8 allows remote attackers to cause a denial of service (crash) via a Yahoo! P2P message with a crafted length field, which triggers a buffer over-read. libpurple/protocols/yahoo/libymsg.c en Pidgin anterior a 2.10.8 permite a atacantes remotos causar una denegación de servicio (caída) a través de un mensaje Yahoo! P2P con un campo "length" manipulado, lo que provoca una sobre-lectura del buffer. • http://hg.pidgin.im/pidgin/main/rev/4d139ce8f7ec http://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html http://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html http://www.debian.org/security/2014/dsa-2859 http://www.pidgin.im/news/security/?id=74 http://www.ubuntu.com/usn/USN-2100-1 https://rhn.redhat.com/errata/RHSA-2014-0139.html https://access.redhat.com/security/cve/CVE-2013-6481 https://bugzilla.redhat.com/show_bug.cgi?id=1056908 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-125: Out-of-bounds Read •

CVSS: 5.0EPSS: 0%CPEs: 53EXPL: 0

util.c in libpurple in Pidgin before 2.10.8 does not properly allocate memory for HTTP responses that are inconsistent with the Content-Length header, which allows remote HTTP servers to cause a denial of service (application crash) via a crafted response. util.c en libpurple en Pidgin anterior a 2.10.8 no reserva correctamente la memoria para las respuestas HTTP que son inconsistentes con la cabecera Content-Length, lo que permite a servidores HTTP remotos causar una denegación de servicio (caída de la aplicación) a través de una respuesta manipulada. • http://hg.pidgin.im/pidgin/main/rev/cd529e1158d3 http://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html http://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html http://pidgin.im/news/security/?id=73 http://www.debian.org/security/2014/dsa-2859 http://www.ubuntu.com/usn/USN-2100-1 https://rhn.redhat.com/errata/RHSA-2014-0139.html https://access.redhat.com/security/cve/CVE-2013-6479 https://bugzilla.redhat.com/show_bug.cgi?id=1056907 • CWE-399: Resource Management Errors •

CVSS: 5.0EPSS: 1%CPEs: 53EXPL: 0

The IRC protocol plugin in libpurple in Pidgin before 2.10.8 does not validate argument counts, which allows remote IRC servers to cause a denial of service (application crash) via a crafted message. El plugin del protocolo IRC en libpurple en Pidgin anterior a 2.10.8 no valida la cantidad de argumentos, lo que permite a servidores IRC remotos causar una denegación de servicio (caída de la aplicación) a través de un mensaje manipulado. • http://hg.pidgin.im/pidgin/main/rev/4d9be297d399 http://hg.pidgin.im/pidgin/main/rev/5845d9fa7084 http://hg.pidgin.im/pidgin/main/rev/6b0e0566af20 http://hg.pidgin.im/pidgin/main/rev/7d0fb0c6d8d4 http://hg.pidgin.im/pidgin/main/rev/9f132a6855cd http://hg.pidgin.im/pidgin/main/rev/a167504359e5 http://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html http://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html http://pidgin.im/news/security/?id=85 http:&# • CWE-20: Improper Input Validation CWE-628: Function Call with Incorrectly Specified Arguments •

CVSS: 9.3EPSS: 1%CPEs: 53EXPL: 0

gtkutils.c in Pidgin before 2.10.8 on Windows allows user-assisted remote attackers to execute arbitrary programs via a message containing a file: URL that is improperly handled during construction of an explorer.exe command. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3185. gtkutils.c en Pidgin anterior a 2.10.8 en Windows permite a atacantes remotos asistidos por usuario ejecutar programas arbitrarios a través de un mensaje que contenga un archivo: URL que no es manejada debidamente durante la construcción de un comando de explorer.exe. NOTA: esta vulnerabilidad existe debido a una correción incompleta para CVE-2011-3185. • http://hg.pidgin.im/pidgin/main/rev/b2571530fa8b http://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html http://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html http://pidgin.im/news/security/?id=81 http://www.securityfocus.com/bid/65189 • CWE-20: Improper Input Validation •