libgadu before 1.11.4 and 1.12.0 before 1.12.0-rc3, as used in Pidgin and other products, allows remote Gadu-Gadu file relay servers to cause a denial of service (memory overwrite) or possibly execute arbitrary code via a crafted message.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://security.gentoo.org/glsa/201508-02 | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1099776 | |
http://lists.ziew.org/pipermail/libgadu-devel/2014-May/001180.html | mailing list |
http://www.ubuntu.com/usn/USN-2215-1 | vendor advisory |
http://secunia.com/advisories/58870 | third party advisory |
http://www.debian.org/security/2014/dsa-2935 | vendor advisory |
http://www.openwall.com/lists/oss-security/2014/05/19/3 | mailing list |
http://secunia.com/advisories/58668 | third party advisory |
http://www.ubuntu.com/usn/USN-2216-1 | vendor advisory |
http://lists.ziew.org/pipermail/libgadu-devel/2014-May/001171.html | mailing list |
http://secunia.com/advisories/58871 | third party advisory |
http://www.securityfocus.com/bid/67471 | vdb entry |