Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
Unknown
Privileges Required
Unknown
Attack Vector
Unknown
0

CVE-2009-2694

Disclosure Date: August 21, 2009
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

The msn_slplink_process_msg function in libpurple/protocols/msn/slplink.c in libpurple, as used in Pidgin (formerly Gaim) before 2.5.9 and Adium 1.3.5 and earlier, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) by sending multiple crafted SLP (aka MSNSLP) messages to trigger an overwrite of an arbitrary memory location. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-1376.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
None
Impact Score:
Unknown
Exploitability Score:
Unknown
Vector:
Unknown
Attack Vector (AV):
Unknown
Attack Complexity (AC):
Unknown
Privileges Required (PR):
Unknown
User Interaction (UI):
Unknown
Scope (S):
Unknown
Confidentiality (C):
Unknown
Integrity (I):
Unknown
Availability (A):
Unknown

General Information

Vendors

  • adium,
  • pidgin

Products

  • adium,
  • adium 1.2.7,
  • adium 1.3,
  • adium 1.3.1,
  • adium 1.3.2,
  • adium 1.3.3,
  • adium 1.3.4,
  • pidgin,
  • pidgin 2.0.0,
  • pidgin 2.0.1,
  • pidgin 2.0.2,
  • pidgin 2.1.0,
  • pidgin 2.1.1,
  • pidgin 2.2.0,
  • pidgin 2.2.1,
  • pidgin 2.2.2,
  • pidgin 2.3.0,
  • pidgin 2.3.1,
  • pidgin 2.4.0,
  • pidgin 2.4.1,
  • pidgin 2.4.2,
  • pidgin 2.4.3,
  • pidgin 2.5.0,
  • pidgin 2.5.1,
  • pidgin 2.5.2,
  • pidgin 2.5.3,
  • pidgin 2.5.4,
  • pidgin 2.5.6,
  • pidgin 2.5.7
Technical Analysis