// For flags

CVE-2008-2927

Multiple Vendor libpurple MSN Protocol SLP Message Heap Overflow Vulnerability

Severity Score

6.8
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Multiple integer overflows in the msn_slplink_process_msg functions in the MSN protocol handler in (1) libpurple/protocols/msn/slplink.c and (2) libpurple/protocols/msnp9/slplink.c in Pidgin before 2.4.3 and Adium before 1.3 allow remote attackers to execute arbitrary code via a malformed SLP message with a crafted offset value, a different vulnerability than CVE-2008-2955.

Múltiples desbordamiento de enteros en las funciones msn_slplink_process_msg en el manejador de protocolo MSN en los archivos (1) libpurple/protocols/msn/slplink.c y (2) libpurple/protocols/msnp9/slplink.c en Pidgin anterior a versión 2.4.3 y Adium anterior a versión 1.3, permiten a los atacantes remotos ejecutar código arbitrario por medio de un mensaje SLP malformado con un valor de desplazamiento diseñado, una vulnerabilidad diferente de CVE-2008-2955.

This vulnerability allows remote attackers to execute arbitrary code on systems with vulnerable installations of messaging applications that make use of the libpurple library. User interaction is not required to exploit this vulnerability.
The specific flaw exists in the implementation of the MSN protocol, specifically the handling of SLP messages. The function msn_slplink_process_msg() fails to properly validate an offset value specified in the SLP packet. By providing a specific value, an attacker can overflow a heap buffer resulting in arbitrary code execution.

*Credits: Anonymous
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
Attack Vector
Network
Attack Complexity
Medium
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2008-06-30 CVE Reserved
  • 2008-07-07 CVE Published
  • 2024-07-13 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-189: Numeric Errors
  • CWE-190: Integer Overflow or Wraparound
CAPEC
References (32)
URL Tag Source
http://developer.pidgin.im/viewmtn/revision/diff/6eb1949a96fa80a4c744fc749c2562abc4cc9ed6/with/c3831c9181f4f61b747321240086ee79e4a08fd8/libpurple/protocols/msn/slplink.c X_refsource_confirm
http://developer.pidgin.im/viewmtn/revision/diff/6eb1949a96fa80a4c744fc749c2562abc4cc9ed6/with/c3831c9181f4f61b747321240086ee79e4a08fd8/libpurple/protocols/msnp9/slplink.c X_refsource_confirm
http://secunia.com/advisories/32859 Third Party Advisory
http://secunia.com/advisories/32861 Third Party Advisory
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0246 X_refsource_confirm
http://www.openwall.com/lists/oss-security/2008/07/03/6 Mailing List
http://www.openwall.com/lists/oss-security/2008/07/04/1 Mailing List
http://www.pidgin.im/news/security/?id=25 X_refsource_confirm
http://www.securityfocus.com/archive/1/493682 Mailing List
http://www.securityfocus.com/archive/1/495165/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/495818/100/0/threaded Mailing List
http://www.securityfocus.com/bid/29956 Vdb Entry
http://www.securitytracker.com/id?1020451 Vdb Entry
http://www.zerodayinitiative.com/advisories/ZDI-08-054 X_refsource_misc
https://exchange.xforce.ibmcloud.com/vulnerabilities/44774 Vdb Entry
https://issues.rpath.com/browse/RPL-2647 X_refsource_confirm
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11695 Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17972 Signature
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Pidgin
Search vendor "Pidgin"
Pidgin
Search vendor "Pidgin" for product "Pidgin"
<= 2.4.2
Search vendor "Pidgin" for product "Pidgin" and version " <= 2.4.2"
-
Affected
Pidgin
Search vendor "Pidgin"
Pidgin
Search vendor "Pidgin" for product "Pidgin"
2.0.0
Search vendor "Pidgin" for product "Pidgin" and version "2.0.0"
-
Affected
Pidgin
Search vendor "Pidgin"
Pidgin
Search vendor "Pidgin" for product "Pidgin"
2.0.1
Search vendor "Pidgin" for product "Pidgin" and version "2.0.1"
-
Affected
Pidgin
Search vendor "Pidgin"
Pidgin
Search vendor "Pidgin" for product "Pidgin"
2.0.2
Search vendor "Pidgin" for product "Pidgin" and version "2.0.2"
-
Affected
Pidgin
Search vendor "Pidgin"
Pidgin
Search vendor "Pidgin" for product "Pidgin"
2.1.0
Search vendor "Pidgin" for product "Pidgin" and version "2.1.0"
-
Affected
Pidgin
Search vendor "Pidgin"
Pidgin
Search vendor "Pidgin" for product "Pidgin"
2.1.1
Search vendor "Pidgin" for product "Pidgin" and version "2.1.1"
-
Affected
Pidgin
Search vendor "Pidgin"
Pidgin
Search vendor "Pidgin" for product "Pidgin"
2.2.0
Search vendor "Pidgin" for product "Pidgin" and version "2.2.0"
-
Affected
Pidgin
Search vendor "Pidgin"
Pidgin
Search vendor "Pidgin" for product "Pidgin"
2.2.1
Search vendor "Pidgin" for product "Pidgin" and version "2.2.1"
-
Affected
Pidgin
Search vendor "Pidgin"
Pidgin
Search vendor "Pidgin" for product "Pidgin"
2.2.2
Search vendor "Pidgin" for product "Pidgin" and version "2.2.2"
-
Affected
Pidgin
Search vendor "Pidgin"
Pidgin
Search vendor "Pidgin" for product "Pidgin"
2.3.0
Search vendor "Pidgin" for product "Pidgin" and version "2.3.0"
-
Affected
Pidgin
Search vendor "Pidgin"
Pidgin
Search vendor "Pidgin" for product "Pidgin"
2.3.1
Search vendor "Pidgin" for product "Pidgin" and version "2.3.1"
-
Affected
Pidgin
Search vendor "Pidgin"
Pidgin
Search vendor "Pidgin" for product "Pidgin"
2.4.0
Search vendor "Pidgin" for product "Pidgin" and version "2.4.0"
-
Affected
Pidgin
Search vendor "Pidgin"
Pidgin
Search vendor "Pidgin" for product "Pidgin"
2.4.1
Search vendor "Pidgin" for product "Pidgin" and version "2.4.1"
-
Affected
Adium
Search vendor "Adium"
Adium
Search vendor "Adium" for product "Adium"
<= 1.2.7
Search vendor "Adium" for product "Adium" and version " <= 1.2.7"
-
Affected
Adium
Search vendor "Adium"
Adium
Search vendor "Adium" for product "Adium"
1.0
Search vendor "Adium" for product "Adium" and version "1.0"
-
Affected
Adium
Search vendor "Adium"
Adium
Search vendor "Adium" for product "Adium"
1.0.1
Search vendor "Adium" for product "Adium" and version "1.0.1"
-
Affected
Adium
Search vendor "Adium"
Adium
Search vendor "Adium" for product "Adium"
1.0.2
Search vendor "Adium" for product "Adium" and version "1.0.2"
-
Affected
Adium
Search vendor "Adium"
Adium
Search vendor "Adium" for product "Adium"
1.0.3
Search vendor "Adium" for product "Adium" and version "1.0.3"
-
Affected
Adium
Search vendor "Adium"
Adium
Search vendor "Adium" for product "Adium"
1.0.4
Search vendor "Adium" for product "Adium" and version "1.0.4"
-
Affected
Adium
Search vendor "Adium"
Adium
Search vendor "Adium" for product "Adium"
1.0.5
Search vendor "Adium" for product "Adium" and version "1.0.5"
-
Affected
Adium
Search vendor "Adium"
Adium
Search vendor "Adium" for product "Adium"
1.1
Search vendor "Adium" for product "Adium" and version "1.1"
-
Affected
Adium
Search vendor "Adium"
Adium
Search vendor "Adium" for product "Adium"
1.1.1
Search vendor "Adium" for product "Adium" and version "1.1.1"
-
Affected
Adium
Search vendor "Adium"
Adium
Search vendor "Adium" for product "Adium"
1.1.2
Search vendor "Adium" for product "Adium" and version "1.1.2"
-
Affected
Adium
Search vendor "Adium"
Adium
Search vendor "Adium" for product "Adium"
1.1.3
Search vendor "Adium" for product "Adium" and version "1.1.3"
-
Affected
Adium
Search vendor "Adium"
Adium
Search vendor "Adium" for product "Adium"
1.1.4
Search vendor "Adium" for product "Adium" and version "1.1.4"
-
Affected