Pidgin

Pidgin

86 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.33%
  • Veröffentlicht 29.10.2014 10:55:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The jabber_idn_validate function in jutil.c in the Jabber protocol plugin in libpurple in Pidgin before 2.10.10 allows remote attackers to obtain sensitive information from process memory via a crafted XMPP message.

  • EPSS 1.27%
  • Veröffentlicht 29.10.2014 10:55:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The (1) bundled GnuTLS SSL/TLS plugin and the (2) bundled OpenSSL SSL/TLS plugin in libpurple in Pidgin before 2.10.10 do not properly consider the Basic Constraints extension during verification of X.509 certificates from SSL servers, which allows m...

  • EPSS 2.49%
  • Veröffentlicht 29.10.2014 10:55:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

markup.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.10 allows remote servers to cause a denial of service (application crash) via a large length value in an emoticon response.

  • EPSS 1.03%
  • Veröffentlicht 29.10.2014 10:55:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Absolute path traversal vulnerability in the untar_block function in win32/untar.c in Pidgin before 2.10.10 on Windows allows remote attackers to write to arbitrary files via a drive name in a tar archive of a smiley theme.

  • EPSS 2.49%
  • Veröffentlicht 29.10.2014 10:55:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

nmevent.c in the Novell GroupWise protocol plugin in libpurple in Pidgin before 2.10.10 allows remote servers to cause a denial of service (application crash) via a crafted server message that triggers a large memory allocation.

  • EPSS 51.22%
  • Veröffentlicht 06.02.2014 17:00:06
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The SIMPLE protocol functionality in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a negative Content-Length header, which triggers a buffer overflow.

  • EPSS 0.46%
  • Veröffentlicht 06.02.2014 17:00:05
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Integer signedness error in the MXit functionality in Pidgin before 2.10.8 allows remote attackers to cause a denial of service (segmentation fault) via a crafted emoticon value, which triggers an integer overflow and a buffer overflow.

  • EPSS 3.3%
  • Veröffentlicht 06.02.2014 17:00:05
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg) parser in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a large Content-Length value, which triggers a buffer overflow.

  • EPSS 0.68%
  • Veröffentlicht 06.02.2014 17:00:05
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Pidgin before 2.10.8 allows remote MSN servers to cause a denial of service (NULL pointer dereference and crash) via a crafted (1) SOAP response, (2) OIM XML response, or (3) Content-Length header.

  • EPSS 1.1%
  • Veröffentlicht 06.02.2014 17:00:05
  • Zuletzt bearbeitet 11.04.2025 00:51:21

libpurple/protocols/yahoo/libymsg.c in Pidgin before 2.10.8 allows remote attackers to cause a denial of service (crash) via a Yahoo! P2P message with a crafted length field, which triggers a buffer over-read.