Release Date: | 2010-01-09 |
Directory traversal vulnerability in slp.c in the MSN protocol plugin in libpurple in Pidgin 2.6.4 and Adium 1.3.8 allows remote attackers to read arbitrary files via a .. (dot dot) in an application/x-msnmsgrp2p MSN emoticon (aka custom smiley) request, a related issue to CVE-2004-0122. NOTE: it could be argued that this is resultant from a vulnerability in which an emoticon download request is processed even without a preceding text/x-mms-emoticon message that announced availability of the emoticon. slp.c in the MSN protocol plugin in libpurple in Pidgin before 2.6.6, including 2.6.4, and Adium 1.3.8 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed MSNSLP INVITE request in an SLP message, a different issue than CVE-2010-0013.
See more information about CVE-2010-0013 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS v2.0 metrics and score provided are preliminary and subject to review.
Base Score: | 5 | Base Metrics: | AV:N/AC:L/Au:N/C:P/I:N/A:N |
Access Vector: | Network | Attack Complexity: | Low |
Authentication: | None required | Confidentiality Impact: | Partial |
Integrity Impact: | None | Availability Impact: | None |
Platform | Errata | Release Date |
Oracle Enterprise Linux version 4 (pidgin) | ELSA-2010-0044 | 2010-01-14 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team