cve-2011-3594
Vulnerability from cvelistv5
Published
2011-11-04 21:00
Modified
2024-08-06 23:37
Severity ?
Summary
The g_markup_escape_text function in the SILC protocol plug-in in libpurple 2.10.0 and earlier, as used in Pidgin and possibly other products, allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with certain versions of glib2.
References
secalert@redhat.comhttp://developer.pidgin.im/ticket/14636Exploit
secalert@redhat.comhttp://developer.pidgin.im/viewmtn/revision/diff/be5e66abad2af29604bc794cc4c6600ab12751f3/with/7eb1f6d56cc58bbb5b56b7df53955d36b9b419b8
secalert@redhat.comhttp://pidgin.im/news/security/?id=56
secalert@redhat.comhttp://secunia.com/advisories/46376Vendor Advisory
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2011:183
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2011-1371.html
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=743481
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18034
af854a3a-2127-422b-91ae-364da2661108http://developer.pidgin.im/ticket/14636Exploit
af854a3a-2127-422b-91ae-364da2661108http://developer.pidgin.im/viewmtn/revision/diff/be5e66abad2af29604bc794cc4c6600ab12751f3/with/7eb1f6d56cc58bbb5b56b7df53955d36b9b419b8
af854a3a-2127-422b-91ae-364da2661108http://pidgin.im/news/security/?id=56
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/46376Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2011:183
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2011-1371.html
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=743481
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18034
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:37:48.393Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "oval:org.mitre.oval:def:18034",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18034"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://developer.pidgin.im/viewmtn/revision/diff/be5e66abad2af29604bc794cc4c6600ab12751f3/with/7eb1f6d56cc58bbb5b56b7df53955d36b9b419b8"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=743481"
          },
          {
            "name": "MDVSA-2011:183",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:183"
          },
          {
            "name": "46376",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46376"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://developer.pidgin.im/ticket/14636"
          },
          {
            "name": "RHSA-2011:1371",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-1371.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://pidgin.im/news/security/?id=56"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-10-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The g_markup_escape_text function in the SILC protocol plug-in in libpurple 2.10.0 and earlier, as used in Pidgin and possibly other products, allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with certain versions of glib2."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-18T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "oval:org.mitre.oval:def:18034",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18034"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://developer.pidgin.im/viewmtn/revision/diff/be5e66abad2af29604bc794cc4c6600ab12751f3/with/7eb1f6d56cc58bbb5b56b7df53955d36b9b419b8"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=743481"
        },
        {
          "name": "MDVSA-2011:183",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:183"
        },
        {
          "name": "46376",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46376"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://developer.pidgin.im/ticket/14636"
        },
        {
          "name": "RHSA-2011:1371",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-1371.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://pidgin.im/news/security/?id=56"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2011-3594",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The g_markup_escape_text function in the SILC protocol plug-in in libpurple 2.10.0 and earlier, as used in Pidgin and possibly other products, allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with certain versions of glib2."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "oval:org.mitre.oval:def:18034",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18034"
            },
            {
              "name": "http://developer.pidgin.im/viewmtn/revision/diff/be5e66abad2af29604bc794cc4c6600ab12751f3/with/7eb1f6d56cc58bbb5b56b7df53955d36b9b419b8",
              "refsource": "MISC",
              "url": "http://developer.pidgin.im/viewmtn/revision/diff/be5e66abad2af29604bc794cc4c6600ab12751f3/with/7eb1f6d56cc58bbb5b56b7df53955d36b9b419b8"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=743481",
              "refsource": "MISC",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=743481"
            },
            {
              "name": "MDVSA-2011:183",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:183"
            },
            {
              "name": "46376",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/46376"
            },
            {
              "name": "http://developer.pidgin.im/ticket/14636",
              "refsource": "CONFIRM",
              "url": "http://developer.pidgin.im/ticket/14636"
            },
            {
              "name": "RHSA-2011:1371",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2011-1371.html"
            },
            {
              "name": "http://pidgin.im/news/security/?id=56",
              "refsource": "CONFIRM",
              "url": "http://pidgin.im/news/security/?id=56"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-3594",
    "datePublished": "2011-11-04T21:00:00",
    "dateReserved": "2011-09-21T00:00:00",
    "dateUpdated": "2024-08-06T23:37:48.393Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2011-3594\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2011-11-04T21:55:07.083\",\"lastModified\":\"2024-11-21T01:30:48.927\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The g_markup_escape_text function in the SILC protocol plug-in in libpurple 2.10.0 and earlier, as used in Pidgin and possibly other products, allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with certain versions of glib2.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n g_markup_escape_text en el complemento de protocolo SILC en libpurple v2.10.0 y anteriores, como se usa en Pidgin y posiblemente en otros productos, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de secuencias UTF-8 inv\u00e1lidas que disparan el uso de punteros no v\u00e1lidos y lectura fuera de los l\u00edmites, relacionado con interacciones con ciertas versiones de glib2\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.0\",\"matchCriteriaId\":\"E39F2309-88A3-465B-8B00-2AF4F7E5341D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"694E9267-6C77-485A-A387-620C894D0A19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38121333-EDB4-49D1-8C78-7AC81A5F1694\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07CF32F1-D3F8-40EF-B82A-24B003196BA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8338C31B-AB47-43F3-BA66-E28D42CA11CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91B46C01-4E42-4574-90C6-9BD48FE5E4C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B650359B-C109-40C1-A202-6D52A47FDC6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53DD7C31-A4D9-47E0-9B09-821B5922AA0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C90C816-1692-4FDB-AAFA-EB0C0DB34BB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32C48C29-7D4A-4AA8-8C2C-02A73B659DFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ED29C88-6ABD-46F2-AD25-BD82A6FD788A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59FAAAF5-BED0-4AAC-AD65-7760688AE8FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D54940E-FC08-45DD-9F38-B5AAA13E0AA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08A6A399-2600-4266-A1E5-3230C70777D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E538500B-727D-4BA1-8D03-D3E8D68C64A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3569E38-E238-4F4F-839B-645FA24C75AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9123A9DA-9582-42AB-B6AA-B4B7A88C9462\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95271D73-B2C5-4BA5-B99B-A742B89F03F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F648DF2-78D0-4462-BD90-5575A2D43858\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0C48CD0-8AE6-490E-9D8E-9EE440FA200D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60D86CF3-4525-4C64-BF96-73D0B8ABD0BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61FF2826-D6DF-4F79-9730-B6C30510D4A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E7E4244-968E-451C-8B65-89F5AE90743C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A2B1EE0-7B98-4F65-837E-1E21DA05FCCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"082B4A01-46EF-49D1-AEC2-E85C44B5EC82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C8E11B4-4213-4CBB-AE3E-6DFE060BBF81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E8CE5BE-03B4-4556-8ADE-6E645AD211F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78BDC1AE-C390-42D5-A0EF-80A59C350F5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E95A0047-BB16-4349-9DF1-76785E14DE98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C610601F-0E26-4D8B-916B-0D26F15C875A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00D8C461-E1A7-45B1-8C93-C67AA89FE5AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A948803-6E2C-468B-8B48-30ABBE58A87A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68F91086-15BD-4E7C-995F-99B7894C1BE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06547B5C-62AA-47EB-825B-CD2CF5FEE285\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F31DD21-BDA2-4860-A801-F88F4B3A46E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70DDABE1-FA78-4A04-B6CC-923061168916\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36B72FCA-745A-42D8-8BDD-BD2503AAFE4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADF3C837-FAF9-4F1E-9659-1DF1C2A4E192\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81531C20-5115-470A-830E-53FFC3F25AF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CFA8CD4-6108-4B3D-AE8D-482C693F26A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44E0283D-9A97-4C4C-A11A-BD102D60CCB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.7.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56E61E91-D2B9-46CE-A8E9-F17F7CF4B66F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.7.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A476037A-712E-41AA-A2CA-D1C5624B1D51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.7.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64F8BB6C-CB59-490C-AA87-56E17ABC2AEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.7.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85B34BE2-3207-4085-AEE4-134B4687D26B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A07707B-7497-46B0-AD82-6220D465CA5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:libpurple:2.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6BF6251-A20F-4C9A-A484-5D3F0B0C7A0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87A0BF9F-F7E9-4196-BEF7-800B4C850990\"}]}]}],\"references\":[{\"url\":\"http://developer.pidgin.im/ticket/14636\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"http://developer.pidgin.im/viewmtn/revision/diff/be5e66abad2af29604bc794cc4c6600ab12751f3/with/7eb1f6d56cc58bbb5b56b7df53955d36b9b419b8\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://pidgin.im/news/security/?id=56\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/46376\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:183\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-1371.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=743481\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18034\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://developer.pidgin.im/ticket/14636\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://developer.pidgin.im/viewmtn/revision/diff/be5e66abad2af29604bc794cc4c6600ab12751f3/with/7eb1f6d56cc58bbb5b56b7df53955d36b9b419b8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://pidgin.im/news/security/?id=56\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/46376\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:183\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-1371.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=743481\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18034\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.