diff options
author | wxs <wxs@FreeBSD.org> | 2009-08-21 03:37:44 +0800 |
---|---|---|
committer | wxs <wxs@FreeBSD.org> | 2009-08-21 03:37:44 +0800 |
commit | ff0e7e5961f2652c5720820006f32d99fad500f4 (patch) | |
tree | 53d3231eb21c4be0997feec290a7d2a0649ffbdb | |
parent | 728acec278c3ae01a902a672d4c6ebc90ca4c634 (diff) | |
download | freebsd-ports-gnome-ff0e7e5961f2652c5720820006f32d99fad500f4.tar.gz freebsd-ports-gnome-ff0e7e5961f2652c5720820006f32d99fad500f4.tar.zst freebsd-ports-gnome-ff0e7e5961f2652c5720820006f32d99fad500f4.zip |
- Document pidgin, libpurple, and finch memory corruption.
PR: ports/137997
Submitted by: Armin Pirkovitsch <armin@frozen-zone.org>
-rw-r--r-- | security/vuxml/vuln.xml | 38 |
1 files changed, 38 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 93ff9efc5203..ded826391793 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,44 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="59e7af2d-8db7-11de-883b-001e3300a30d"> + <topic>pidgin -- MSN overflow parsing SLP messages </topic> + <affects> + <package> + <name>pidgin</name> + <name>libpurple</name> + <name>finch</name> + <range><lt>2.5.9</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Secunia reports:</p> + <blockquote cite="http://secunia.com/advisories/36384"> + <p>A vulnerability has been reported in Pidgin, which can be + exploited by malicious people to potentially compromise a user's + system.</p> + <p>The vulnerability is caused due to an error in the + "msn_slplink_process_msg()" function when processing MSN SLP + messages and can be exploited to corrupt memory.</p> + <p>Successful exploitation may allow execution of arbitrary + code.</p> + <p>The vulnerability is reported in versions 2.5.8 and prior. + Other versions may also be affected.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2009-2694</cvename> + <url>http://secunia.com/advisories/36384/</url> + <url>http://www.pidgin.im/news/security/?id=34</url> + </references> + <dates> + <discovery>2009-08-18</discovery> + <entry>2009-08-20</entry> + </dates> + </vuln> + <vuln vid="b31a1088-460f-11de-a11a-0022156e8794"> <topic>GnuTLS -- multiple vulnerabilities</topic> <affects> |