Pidgin: Arbitrary code execution
Gentoo Linux Security Advisory
||GLSA 201209-17 / pidgin
||September 27, 2012
||September 27, 2012: 1
All supported architectures
A buffer overflow in Pidgin might allow remote attackers to execute
arbitrary code or cause Denial of Service.
Pidgin is a GTK Instant Messenger client for a variety of instant
messaging protocols. libpurple is the core library for Pidgin.
A stack-based buffer overflow vulnerability has been found in the MXit
protocol plug-in for libpurple.
A remote attacker could possibly execute arbitrary code with the
privileges of the Pidgin process, or cause a Denial of Service condition.
There is no known workaround at this time.
All Pidgin users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-im/pidgin-2.10.6"