Информационная безопасность
[RU] switch to English


Выполнение кода в Pidgin
Опубликовано:30 августа 2011 г.
Источник:
SecurityVulns ID:11884
Тип:удаленная
Уровень опасности:
6/10
Описание:Возможно выполнение кода через URL file://
Затронутые продукты:PIDGIN : Pidgin 2.9
CVE:CVE-2011-3185 (gtkutils.c in Pidgin before 2.10.0 on Windows allows user-assisted remote attackers to execute arbitrary programs via a file: URL in a message.)
 CVE-2011-3184 (The msn_httpconn_parse_data function in httpconn.c in the MSN protocol plugin in libpurple in Pidgin before 2.10.0 does not properly handle HTTP 100 responses, which allows remote attackers to cause a denial of service (incorrect memory access and application crash) via vectors involving a crafted server message.)
 CVE-2011-2943 (The irc_msg_who function in msgs.c in the IRC protocol plugin in libpurple 2.8.0 through 2.9.0 in Pidgin before 2.10.0 does not properly validate characters in nicknames, which allows user-assisted remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted nickname that is not properly handled in a WHO response.)
Оригинальный текстdocumentInsomnia Security, Insomnia : ISVA-110822.1 - Pidgin IM Insecure URL Handling Remote Code Execution (30.08.2011)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород