ID CVE-2009-1376
Summary Multiple integer overflows in the msn_slplink_process_msg functions in the MSN protocol handler in (1) libpurple/protocols/msn/slplink.c and (2) libpurple/protocols/msnp9/slplink.c in Pidgin (formerly Gaim) before 2.5.6 on 32-bit platforms allow remote attackers to execute arbitrary code via a malformed SLP message with a crafted offset value, leading to buffer overflows. NOTE: this issue exists because of an incomplete fix for CVE-2008-2927.
References
Vulnerable Configurations
  • cpe:2.3:a:pidgin:pidgin:2.4.0:32_bit:*:*:*:*:*:*
    cpe:2.3:a:pidgin:pidgin:2.4.0:32_bit:*:*:*:*:*:*
  • cpe:2.3:a:pidgin:pidgin:2.4.1:32_bit:*:*:*:*:*:*
    cpe:2.3:a:pidgin:pidgin:2.4.1:32_bit:*:*:*:*:*:*
  • cpe:2.3:a:pidgin:pidgin:2.4.2:32_bit:*:*:*:*:*:*
    cpe:2.3:a:pidgin:pidgin:2.4.2:32_bit:*:*:*:*:*:*
  • cpe:2.3:a:pidgin:pidgin:2.4.3:32_bit:*:*:*:*:*:*
    cpe:2.3:a:pidgin:pidgin:2.4.3:32_bit:*:*:*:*:*:*
  • cpe:2.3:a:pidgin:pidgin:2.5.0:32_bit:*:*:*:*:*:*
    cpe:2.3:a:pidgin:pidgin:2.5.0:32_bit:*:*:*:*:*:*
  • cpe:2.3:a:pidgin:pidgin:2.5.2:32_bit:*:*:*:*:*:*
    cpe:2.3:a:pidgin:pidgin:2.5.2:32_bit:*:*:*:*:*:*
  • cpe:2.3:a:pidgin:pidgin:2.5.3:32_bit:*:*:*:*:*:*
    cpe:2.3:a:pidgin:pidgin:2.5.3:32_bit:*:*:*:*:*:*
  • cpe:2.3:a:pidgin:pidgin:2.5.4:32_bit:*:*:*:*:*:*
    cpe:2.3:a:pidgin:pidgin:2.5.4:32_bit:*:*:*:*:*:*
  • cpe:2.3:a:pidgin:pidgin:-:*:*:*:*:*:*:*
    cpe:2.3:a:pidgin:pidgin:-:*:*:*:*:*:*:*
  • cpe:2.3:a:pidgin:pidgin:1.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:pidgin:pidgin:1.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*
    cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*
CVSS
Base: 9.3 (as of 29-09-2017 - 01:34)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:M/Au:N/C:C/I:C/A:C
oval via4
  • accepted 2013-04-29T04:05:59.233-04:00
    class vulnerability
    contributors
    • name Aharon Chernin
      organization SCAP.com, LLC
    • name Dragos Prisaca
      organization G2, Inc.
    definition_extensions
    • comment The operating system installed on the system is Red Hat Enterprise Linux 3
      oval oval:org.mitre.oval:def:11782
    • comment CentOS Linux 3.x
      oval oval:org.mitre.oval:def:16651
    • comment The operating system installed on the system is Red Hat Enterprise Linux 4
      oval oval:org.mitre.oval:def:11831
    • comment CentOS Linux 4.x
      oval oval:org.mitre.oval:def:16636
    • comment Oracle Linux 4.x
      oval oval:org.mitre.oval:def:15990
    • comment The operating system installed on the system is Red Hat Enterprise Linux 5
      oval oval:org.mitre.oval:def:11414
    • comment The operating system installed on the system is CentOS Linux 5.x
      oval oval:org.mitre.oval:def:15802
    • comment Oracle Linux 5.x
      oval oval:org.mitre.oval:def:15459
    description Multiple integer overflows in the msn_slplink_process_msg functions in the MSN protocol handler in (1) libpurple/protocols/msn/slplink.c and (2) libpurple/protocols/msnp9/slplink.c in Pidgin (formerly Gaim) before 2.5.6 on 32-bit platforms allow remote attackers to execute arbitrary code via a malformed SLP message with a crafted offset value, leading to buffer overflows. NOTE: this issue exists because of an incomplete fix for CVE-2008-2927.
    family unix
    id oval:org.mitre.oval:def:10476
    status accepted
    submitted 2010-07-09T03:56:16-04:00
    title Multiple integer overflows in the msn_slplink_process_msg functions in the MSN protocol handler in (1) libpurple/protocols/msn/slplink.c and (2) libpurple/protocols/msnp9/slplink.c in Pidgin (formerly Gaim) before 2.5.6 on 32-bit platforms allow remote attackers to execute arbitrary code via a malformed SLP message with a crafted offset value, leading to buffer overflows. NOTE: this issue exists because of an incomplete fix for CVE-2008-2927.
    version 24
  • accepted 2013-09-30T04:01:14.217-04:00
    class vulnerability
    contributors
    name Shane Shaffer
    organization G2, Inc.
    definition_extensions
    comment Pidgin is installed
    oval oval:org.mitre.oval:def:12366
    description Multiple integer overflows in the msn_slplink_process_msg functions in the MSN protocol handler in (1) libpurple/protocols/msn/slplink.c and (2) libpurple/protocols/msnp9/slplink.c in Pidgin (formerly Gaim) before 2.5.6 on 32-bit platforms allow remote attackers to execute arbitrary code via a malformed SLP message with a crafted offset value, leading to buffer overflows. NOTE: this issue exists because of an incomplete fix for CVE-2008-2927.
    family windows
    id oval:org.mitre.oval:def:18432
    status accepted
    submitted 2013-08-16T15:36:10.221-04:00
    title Multiple integer overflows in the msn_slplink_process_msg functions in the MSN protocol handler in (1) libpurple/protocols/msn/slplink.c and (2) libpurple/protocols/msnp9/slplink.c in Pidgin (formerly Gaim) before 2.5.6 on 32-bit platforms allow remote attackers to execute arbitrary code via a malformed SLP message with a crafted offset value, leading to buffer overflows. NOTE: this issue exists because of an incomplete fix for CVE-2008-2927
    version 4
redhat via4
advisories
  • bugzilla
    id 500493
    title CVE-2009-1376 pidgin incomplete fix for CVE-2008-2927
    oval
    AND
    • comment Red Hat Enterprise Linux 3 is installed
      oval oval:com.redhat.rhba:tst:20070026001
    • comment pidgin is earlier than 0:1.5.1-3.el3
      oval oval:com.redhat.rhsa:tst:20091059002
    • comment pidgin is signed with Red Hat master key
      oval oval:com.redhat.rhsa:tst:20080584003
    rhsa
    id RHSA-2009:1059
    released 2009-05-22
    severity Important
    title RHSA-2009:1059: pidgin security update (Important)
  • bugzilla
    id 500493
    title CVE-2009-1376 pidgin incomplete fix for CVE-2008-2927
    oval
    OR
    • AND
      • comment Red Hat Enterprise Linux 4 is installed
        oval oval:com.redhat.rhba:tst:20070304001
      • OR
        • AND
          • comment finch is earlier than 0:2.5.5-2.el4
            oval oval:com.redhat.rhsa:tst:20091060012
          • comment finch is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20081023015
        • AND
          • comment finch-devel is earlier than 0:2.5.5-2.el4
            oval oval:com.redhat.rhsa:tst:20091060014
          • comment finch-devel is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20081023013
        • AND
          • comment libpurple is earlier than 0:2.5.5-2.el4
            oval oval:com.redhat.rhsa:tst:20091060010
          • comment libpurple is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20081023005
        • AND
          • comment libpurple-devel is earlier than 0:2.5.5-2.el4
            oval oval:com.redhat.rhsa:tst:20091060006
          • comment libpurple-devel is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20081023017
        • AND
          • comment libpurple-perl is earlier than 0:2.5.5-2.el4
            oval oval:com.redhat.rhsa:tst:20091060018
          • comment libpurple-perl is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20081023007
        • AND
          • comment libpurple-tcl is earlier than 0:2.5.5-2.el4
            oval oval:com.redhat.rhsa:tst:20091060004
          • comment libpurple-tcl is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20081023019
        • AND
          • comment pidgin is earlier than 0:2.5.5-2.el4
            oval oval:com.redhat.rhsa:tst:20091060002
          • comment pidgin is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20080584003
        • AND
          • comment pidgin-devel is earlier than 0:2.5.5-2.el4
            oval oval:com.redhat.rhsa:tst:20091060016
          • comment pidgin-devel is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20081023009
        • AND
          • comment pidgin-perl is earlier than 0:2.5.5-2.el4
            oval oval:com.redhat.rhsa:tst:20091060008
          • comment pidgin-perl is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20081023011
    • AND
      • comment Red Hat Enterprise Linux 5 is installed
        oval oval:com.redhat.rhba:tst:20070331001
      • OR
        • AND
          • comment finch is earlier than 0:2.5.5-3.el5
            oval oval:com.redhat.rhsa:tst:20091060035
          • comment finch is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20080584016
        • AND
          • comment finch-devel is earlier than 0:2.5.5-3.el5
            oval oval:com.redhat.rhsa:tst:20091060025
          • comment finch-devel is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20080584014
        • AND
          • comment libpurple is earlier than 0:2.5.5-3.el5
            oval oval:com.redhat.rhsa:tst:20091060027
          • comment libpurple is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20080584020
        • AND
          • comment libpurple-devel is earlier than 0:2.5.5-3.el5
            oval oval:com.redhat.rhsa:tst:20091060023
          • comment libpurple-devel is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20080584018
        • AND
          • comment libpurple-perl is earlier than 0:2.5.5-3.el5
            oval oval:com.redhat.rhsa:tst:20091060029
          • comment libpurple-perl is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20080584010
        • AND
          • comment libpurple-tcl is earlier than 0:2.5.5-3.el5
            oval oval:com.redhat.rhsa:tst:20091060033
          • comment libpurple-tcl is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20080584012
        • AND
          • comment pidgin is earlier than 0:2.5.5-3.el5
            oval oval:com.redhat.rhsa:tst:20091060021
          • comment pidgin is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20080584008
        • AND
          • comment pidgin-devel is earlier than 0:2.5.5-3.el5
            oval oval:com.redhat.rhsa:tst:20091060037
          • comment pidgin-devel is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20080584024
        • AND
          • comment pidgin-perl is earlier than 0:2.5.5-3.el5
            oval oval:com.redhat.rhsa:tst:20091060031
          • comment pidgin-perl is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20080584022
    rhsa
    id RHSA-2009:1060
    released 2009-05-22
    severity Important
    title RHSA-2009:1060: pidgin security update (Important)
rpms
  • pidgin-0:1.5.1-3.el3
  • finch-0:2.5.5-2.el4
  • finch-devel-0:2.5.5-2.el4
  • libpurple-0:2.5.5-2.el4
  • libpurple-devel-0:2.5.5-2.el4
  • libpurple-perl-0:2.5.5-2.el4
  • libpurple-tcl-0:2.5.5-2.el4
  • pidgin-0:2.5.5-2.el4
  • pidgin-devel-0:2.5.5-2.el4
  • pidgin-perl-0:2.5.5-2.el4
  • finch-0:2.5.5-3.el5
  • finch-devel-0:2.5.5-3.el5
  • libpurple-0:2.5.5-3.el5
  • libpurple-devel-0:2.5.5-3.el5
  • libpurple-perl-0:2.5.5-3.el5
  • libpurple-tcl-0:2.5.5-3.el5
  • pidgin-devel-0:2.5.5-3.el5
  • pidgin-perl-0:2.5.5-3.el5
refmap via4
bid 35067
confirm
debian DSA-1805
fedora
  • FEDORA-2009-5552
  • FEDORA-2009-5583
  • FEDORA-2009-5597
gentoo GLSA-200905-07
mandriva
  • MDVSA-2009:140
  • MDVSA-2009:173
secunia
  • 35188
  • 35194
  • 35202
  • 35215
  • 35294
  • 35329
  • 35330
  • 37071
ubuntu
  • USN-781-1
  • USN-781-2
vupen ADV-2009-1396
xf pidgin-msn-slp-bo(50680)
Last major update 29-09-2017 - 01:34
Published 26-05-2009 - 15:30
Back to Top