pidgin: buffer/integer overflows *Package(s)*:pidgin *CVE #(s)*:CVE-2009-1373 CVE-2009-1376 *Created*:May 22, 2009 *Updated*:June 2, 2009 *Description*: From the Red Hat advisory: A buffer overflow flaw was found in the way Pidgin initiates file transfers when using the Extensible Messaging and Presence Protocol (XMPP). If a Pidgin client initiates a file transfer, and the remote target sends a malformed response, it could cause Pidgin to crash or, potentially, execute arbitrary code with the permissions of the user running Pidgin. This flaw only affects accounts using XMPP, such as Jabber and Google Talk. (CVE-2009-1373) It was discovered that on 32-bit platforms, the Red Hat Security Advisory RHSA-2008:0584 provided an incomplete fix for the integer overflow flaw affecting Pidgin's MSN protocol handler. If a Pidgin client receives a specially-crafted MSN message, it may be possible to execute arbitrary code with the permissions of the user running Pidgin. (CVE-2009-1376) *Alerts*: Red Hat RHSA-2009:1059-02 2009-05-22 Red Hat RHSA-2009:1060-02 2009-05-22 CentOS CESA-2009:1059 2009-05-22 CentOS CESA-2009:1060 2009-05-22 Debian DSA-1805-1 2009-05-22 Gentoo 200905-07 2009-05-25 Slackware SSA:2009-146-01 2009-05-27 Fedora FEDORA-2009-5552 2009-05-28 Fedora FEDORA-2009-5597 2009-05-28 Fedora FEDORA-2009-5583 2009-05-28 http://lwn.net/Articles/334067/ -- Thanks and best regards, Ryan Rix TamsPalm - The PalmOS Blog (623)-239-1103 <-- Grand Central, baby! Jasmine Bowden - Class of 2009, Marc Rasmussen - Class of 2008, Erica Sheffey - Class of 2009, Rest in peace.