Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-8833

Опубликовано: 12 апр. 2016
Источник: debian

Описание

Use-after-free vulnerability in the create_smp_dialog function in gtk-dialog.c in the Off-the-Record Messaging (OTR) pidgin-otr plugin before 4.0.2 for Pidgin allows remote attackers to execute arbitrary code via vectors related to the "Authenticate buddy" menu item.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
pidgin-otrfixed4.0.2-1package
pidgin-otrnot-affectedwheezypackage

Примечания

  • https://blog.fuzzing-project.org/39-Heap-use-after-free-in-Pidgin-OTR-plugin.html

  • https://bugs.otr.im/issues/88

  • https://bugs.otr.im/issues/128

  • Fixed by: https://bugs.otr.im/projects/pidgin-otr/repository/revisions/aaf551b9dd5cbba8c4abaa3d4dc7ead860efef94

  • Introduced by: https://bugs.otr.im/projects/pidgin-otr/repository/revisions/c276bfa786bef8a4572a37d5633cf40f480d3ae0

  • https://www.openwall.com/lists/oss-security/2016/03/09/8

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 10 лет назад

Use-after-free vulnerability in the create_smp_dialog function in gtk-dialog.c in the Off-the-Record Messaging (OTR) pidgin-otr plugin before 4.0.2 for Pidgin allows remote attackers to execute arbitrary code via vectors related to the "Authenticate buddy" menu item.

CVSS3: 9.8
nvd
почти 10 лет назад

Use-after-free vulnerability in the create_smp_dialog function in gtk-dialog.c in the Off-the-Record Messaging (OTR) pidgin-otr plugin before 4.0.2 for Pidgin allows remote attackers to execute arbitrary code via vectors related to the "Authenticate buddy" menu item.

suse-cvrf
почти 10 лет назад

Security update for pidgin-otr

suse-cvrf
почти 10 лет назад

Security update for pidgin-otr

CVSS3: 9.8
github
больше 3 лет назад

Use-after-free vulnerability in the create_smp_dialog function in gtk-dialog.c in the Off-the-Record Messaging (OTR) pidgin-otr plugin before 4.0.2 for Pidgin allows remote attackers to execute arbitrary code via vectors related to the "Authenticate buddy" menu item.