** Changed in: gentoo
       Status: Unknown => Fix Released

-- 
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to pidgin in Ubuntu.
https://bugs.launchpad.net/bugs/1022012

Title:
  (CVE-2012-3374) <pidgin-2.10.5: MXit buffer overflow

Status in Pidgin:
  Fix Released
Status in “pidgin” package in Ubuntu:
  Fix Released
Status in “pidgin” package in Fedora:
  Unknown
Status in Gentoo Linux:
  Fix Released

Bug description:
  A new update, version 2.10.5, to the open source Pidgin instant messaging 
program has been released, closing an important security hole. Previous 
versions of Pidgin contained a vulnerability, discovered by Ulf Härnhammar, in 
the MXit component, where parsing incoming messages with inline images led to a 
buffer overflow.
  The developers say that this could have been exploited by an attacker to 
execute arbitrary code on a victim's system by using a specially crafted 
message. Versions up to and including 2.10.4 are affected. Upgrading to Pidgin 
2.10.5 fixes the problem; all users are advised to upgrade. Other bugs, 
including an issue that caused the application to crash, have also been fixed.

  http://www.pidgin.im/news/security/index.php?id=64

To manage notifications about this bug go to:
https://bugs.launchpad.net/pidgin/+bug/1022012/+subscriptions

-- 
Mailing list: https://launchpad.net/~desktop-packages
Post to     : desktop-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~desktop-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to