← Retour aux CVEs
CVE-2009-3615
N/ADescription
The OSCAR protocol plugin in libpurple in Pidgin before 2.6.3 and Adium before 1.3.7 allows remote attackers to cause a denial of service (application crash) via crafted contact-list data for (1) ICQ and possibly (2) AIM, as demonstrated by the SIM IM client.
Details CVE
Score CVSS v3.1N/A
Publie10/20/2009
Derniere modification4/23/2026
Sourcenvd
Observations honeypot0
Produits affectes
adium:adiumpidgin:pidgin
Faiblesses (CWE)
CWE-399
References
http://developer.pidgin.im/ticket/10481(secalert@redhat.com)
http://developer.pidgin.im/viewmtn/revision/info/781682333aea0c801d280c3507ee25552a60bfc0(secalert@redhat.com)
http://developer.pidgin.im/wiki/ChangeLog(secalert@redhat.com)
http://secunia.com/advisories/37017(secalert@redhat.com)
http://secunia.com/advisories/37072(secalert@redhat.com)
http://www.mandriva.com/security/advisories?name=MDVSA-2010:085(secalert@redhat.com)
http://www.pidgin.im/news/security/?id=41(secalert@redhat.com)
http://www.securityfocus.com/bid/36719(secalert@redhat.com)
http://www.vupen.com/english/advisories/2009/2949(secalert@redhat.com)
http://www.vupen.com/english/advisories/2009/2951(secalert@redhat.com)
http://www.vupen.com/english/advisories/2010/1020(secalert@redhat.com)
https://exchange.xforce.ibmcloud.com/vulnerabilities/53807(secalert@redhat.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18388(secalert@redhat.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9414(secalert@redhat.com)
http://developer.pidgin.im/ticket/10481(af854a3a-2127-422b-91ae-364da2661108)
http://developer.pidgin.im/viewmtn/revision/info/781682333aea0c801d280c3507ee25552a60bfc0(af854a3a-2127-422b-91ae-364da2661108)
http://developer.pidgin.im/wiki/ChangeLog(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/37017(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/37072(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDVSA-2010:085(af854a3a-2127-422b-91ae-364da2661108)
http://www.pidgin.im/news/security/?id=41(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/36719(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2009/2949(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2009/2951(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2010/1020(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/53807(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18388(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9414(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.