Pidgin: Arbitrary code execution — GLSA 201209-17

A buffer overflow in Pidgin might allow remote attackers to execute arbitrary code or cause Denial of Service.

Affected packages

net-im/pidgin on all architectures
Affected versions < 2.10.6
Unaffected versions >= 2.10.6

Background

Pidgin is a GTK Instant Messenger client for a variety of instant messaging protocols. libpurple is the core library for Pidgin.

Description

A stack-based buffer overflow vulnerability has been found in the MXit protocol plug-in for libpurple.

Impact

A remote attacker could possibly execute arbitrary code with the privileges of the Pidgin process, or cause a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All Pidgin users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-im/pidgin-2.10.6"
 

References

Release date
September 27, 2012

Latest revision
September 27, 2012: 1

Severity
high

Exploitable
remote

Bugzilla entries