10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
pidgin is vulnerable to arbitrary code execution. If a user received a malicious MSN message, it was possible to execute arbitrary code with the permissions of the user running Pidgin.
developer.pidgin.im/viewmtn/revision/info/6f7343166c673bf0496ecb1afec9b633c1d54a0e
developer.pidgin.im/wiki/ChangeLog
secunia.com/advisories/36384
secunia.com/advisories/36392
secunia.com/advisories/36401
secunia.com/advisories/36402
secunia.com/advisories/36708
secunia.com/advisories/37071
sunsolve.sun.com/search/document.do?assetkey=1-66-266908-1
www.coresecurity.com/content/libpurple-arbitrary-write
www.debian.org/security/2009/dsa-1870
www.exploit-db.com/exploits/9615
www.pidgin.im/news/security/?id=34
www.redhat.com/security/updates/classification/#critical
www.vupen.com/english/advisories/2009/2303
www.vupen.com/english/advisories/2009/2663
access.redhat.com/errata/RHSA-2009:1218
bugzilla.redhat.com/show_bug.cgi?id=514957
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10319
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6320
rhn.redhat.com/errata/RHSA-2009-1218.html