Launchpad has imported 6 comments from the remote bug at
https://bugzilla.redhat.com/show_bug.cgi?id=453764.

If you reply to an imported comment from within Launchpad, your comment
will be sent to the remote bug automatically. Read more about
Launchpad's inter-bugtracker facilities at
https://help.launchpad.net/InterBugTracking.

------------------------------------------------------------------------
On 2008-07-02T13:14:49+00:00 Josh wrote:

An integer overflow in Pidgin's MSN protocol handler could allow malformed SLP
message to cause an integer overflow, which could result in arbitrary code
execution.

This flaw is only exploitable by individuals who can message a user, which is
controlled by the Pidgin privacy setting.  The default setting is to only allow
messages from users in the buddy list.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/pidgin/+bug/245770/comments/0

------------------------------------------------------------------------
On 2008-07-02T13:14:49+00:00 Josh wrote:

Created attachment 310788
Proposed upstream patch

Reply at:
https://bugs.launchpad.net/ubuntu/+source/pidgin/+bug/245770/comments/1

------------------------------------------------------------------------
On 2008-07-02T14:37:24+00:00 Warren wrote:

#
#
# patch "libpurple/protocols/msnp9/slplink.c"
#  from [0148f31961bbe4a9a992377e70db082952505db4]
#    to [f65596ea173bf7c9c1114edd7599140f470e7788]
#
============================================================
--- libpurple/protocols/msnp9/slplink.c 0148f31961bbe4a9a992377e70db082952505db4
+++ libpurple/protocols/msnp9/slplink.c f65596ea173bf7c9c1114edd7599140f470e7788
@@ -597,7 +597,7 @@ msn_slplink_process_msg(MsnSlpLink *slpl
        }
        else if (slpmsg->size)
        {
-               if ((offset + len) > slpmsg->size)
+               if (G_MAXSIZE - len < offset || (offset + len) > slpmsg->size)
                {
                        purple_debug_error("msn", "Oversized slpmsg\n");
                        g_return_if_reached();

For reference, this is the upstream patch that went into 2.4.3.  I need to
backport this for pidgin-2.3.1 in RHEL4 and RHEL5, and pidgin-1.5.x in RHEL3.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/pidgin/+bug/245770/comments/2

------------------------------------------------------------------------
On 2008-07-04T02:01:38+00:00 Josh wrote:

I'm making this bug public in order to avoid creating confusion.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/pidgin/+bug/245770/comments/3

------------------------------------------------------------------------
On 2008-08-27T19:50:04+00:00 Tomas wrote:

Upstream advisory:
  http://www.pidgin.im/news/security/?id=25

Fixed upstream in: 2.4.3

Reply at:
https://bugs.launchpad.net/ubuntu/+source/pidgin/+bug/245770/comments/8

------------------------------------------------------------------------
On 2009-06-09T07:14:17+00:00 Red wrote:

This issue was addressed in:

Red Hat Enterprise Linux:
  http://rhn.redhat.com/errata/RHSA-2008-0584.html

Fedora:
  https://admin.fedoraproject.org/updates/F10/FEDORA-2009-5597
  https://admin.fedoraproject.org/updates/F11/FEDORA-2009-5583
  https://admin.fedoraproject.org/updates/F9/FEDORA-2009-5552

Reply at:
https://bugs.launchpad.net/ubuntu/+source/pidgin/+bug/245770/comments/10


** Changed in: pidgin (Fedora)
       Status: Unknown => Fix Released

** Changed in: pidgin (Fedora)
   Importance: Unknown => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/245770

Title:
  [CVE-2008-2927] MSN integer overflow in Pidgin

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pidgin/+bug/245770/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to