Exploit Pidgin 2.4.2 - 'msn_slplink_process_msg()' Denial of Service

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
32749
Проверка EDB
  1. Пройдено
Автор
JUAN PABLO LOPEZ YACUBIAN
Тип уязвимости
DOS
Платформа
LINUX
CVE
cve-2008-2955
Дата публикации
2009-01-26
Код:
source: https://www.securityfocus.com/bid/33414/info

Pidgin is prone to a denial-of-service vulnerability because it fails to properly sanitize user-supplied input.

Successful exploits will cause the affected application to crash, effectively denying service to legitimate users.

Pidgin 2.4.1 is vulnerable; other versions may also be affected.

NOTE: This issue was previously thought to be a subset of the vulnerability documented in BID 29956 (Pidgin 'msn_slplink_process_msg()' Multiple Integer Overflow Vulnerabilities), but has been given its own record to properly document the vulnerability. 

Sending a filename that contains the maximum number of allowable characters and that includes the characters defined by the hex data below will crash the application.

'26 23 38 32 32 37 3b 20 26 23 38 32 32 38 3b 20 26 23 38 32 32 39 3b 20 85'
 
Источник
www.exploit-db.com

Похожие темы