Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Sat, 9 Jan 2010 13:08:49 -0500 (EST)
From: "Steven M. Christey" <coley@...us.mitre.org>
To: oss-security@...ts.openwall.com
cc: bressers@...hat.com
Subject: Re: CVE request - pidgin MSN arbitrary file upload


On Thu, 7 Jan 2010, Nico Golde wrote:

> While everyone is talking about the file inclusion vulnerability which is
> really important, has anyone investigated the SLP memory corruption issue yet?
> Page 24: http://events.ccc.de/congress/2009/Fahrplan/attachments/1483_26c3_ipv4_fuckups.pdf


Use CVE-2010-0277 for the memory corruption.

- Steve

======================================================
Name: CVE-2010-0277
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0277
Reference: MLIST:[oss-security] 20100107 Re: CVE request - pidgin MSN arbitrary file upload
Reference: URL:http://www.openwall.com/lists/oss-security/2010/01/07/2
Reference: MISC:http://events.ccc.de/congress/2009/Fahrplan/events/3596.en.html

slp.c in the MSN protocol plugin in libpurple in Pidgin 2.6.4 and
Adium 1.3.8 allows remote attackers to cause a denial of service
(memory corruption) or possibly have unspecified other impact via
unknown vectors, a different issue than CVE-2010-0013.


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.