Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7pmp-xp53-4j98

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The msn_slp_process_msg function in libpurple/protocols/msn/slpcall.c in the MSN protocol plugin in libpurple 2.6.0 and 2.6.1, as used in Pidgin before 2.6.2, allows remote attackers to cause a denial of service (application crash) via a handwritten (aka Ink) message, related to an uninitialized variable and the incorrect "UTF16-LE" charset name.

The msn_slp_process_msg function in libpurple/protocols/msn/slpcall.c in the MSN protocol plugin in libpurple 2.6.0 and 2.6.1, as used in Pidgin before 2.6.2, allows remote attackers to cause a denial of service (application crash) via a handwritten (aka Ink) message, related to an uninitialized variable and the incorrect "UTF16-LE" charset name.

EPSS

Процентиль: 80%
0.01382
Низкий

Дефекты

CWE-20

Связанные уязвимости

ubuntu
больше 16 лет назад

The msn_slp_process_msg function in libpurple/protocols/msn/slpcall.c in the MSN protocol plugin in libpurple 2.6.0 and 2.6.1, as used in Pidgin before 2.6.2, allows remote attackers to cause a denial of service (application crash) via a handwritten (aka Ink) message, related to an uninitialized variable and the incorrect "UTF16-LE" charset name.

nvd
больше 16 лет назад

The msn_slp_process_msg function in libpurple/protocols/msn/slpcall.c in the MSN protocol plugin in libpurple 2.6.0 and 2.6.1, as used in Pidgin before 2.6.2, allows remote attackers to cause a denial of service (application crash) via a handwritten (aka Ink) message, related to an uninitialized variable and the incorrect "UTF16-LE" charset name.

debian
больше 16 лет назад

The msn_slp_process_msg function in libpurple/protocols/msn/slpcall.c ...

EPSS

Процентиль: 80%
0.01382
Низкий

Дефекты

CWE-20