Pidgin < 2.5.9 'msn_slplink_process_msg()' Memory Corruption

This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.


Synopsis :

The remote host has an instant messaging client that is affected by a
memory corruption vulnerability.

Description :

The version of Pidgin installed on the remote host is earlier than
2.5.9. Such versions are reportedly affected by a vulnerability in
'msn_slplink_process_msg()'. Maliciously crafted MSN SLP messages
can result in memory corruption. A remote attacker could use this to
crash the client, or execute arbitrary code.

This attack does not require user interaction or that the attacker
is in the victim's buddy list (using the default configuration).

See also :

http://www.coresecurity.com/content/libpurple-arbitrary-write
http://seclists.org/bugtraq/2009/Aug/174
http://pidgin.im/news/security/?id=34

Solution :

Upgrade to Pidgin 2.5.9 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.7
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 40663 ()

Bugtraq ID: 36071

CVE ID: CVE-2009-2694

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now