Name : Pidgin Denial of Service Vulnerability
Date : August, 23 2010
Vendor Url : http://www.pidgin.im/
Author : Sid3^effects aKa HaRi <shell_c99[at]yahoo.com>
Big hugs : Th3 RDX,Hanan_butt :)
special thanks to : r0073r (inj3ct0r.com),L0rd CruSad3r,MaYur,MA1201,KeDar,Sonic,gunslinger_,Sn!pEr.S!Te,n4pst3rr
greetz to :www.topsecure.net ,trent Dillman,All ICW members and my friends :) luv y0 guyz
#######################################################################################################
Descrition:
*By sending a message of a particular size can crash the application.
*The vulnerability is caused by a buffer overflow error when processing malformed message, which could be exploited to crash
the application.
*This can also lead to the execution of arbitrary code.
--------------------------------------------------------------------------------------------------------------
Affected Products :
Pidgin 2.7.3
---------------------------------------------------------------------------------------------------------------
Solution:
N/a
###############################################################################################################
# 0day no more
# Sid3^effects
暂无评论