Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <13511.1215102746@devserv.devel.redhat.com>
Date: Thu, 03 Jul 2008 12:32:26 -0400
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com, Nico Golde <oss-security+ml@...lde.de>
Subject: Re: Re: CVE Request (pidgin)

On 3 July 2008, Nico Golde wrote:
> > Name: CVE-2008-2955

> >
> > Pidgin 2.4.1 allows remote attackers to cause a denial of service
> > (crash) via a long filename that contains certain characters, as
> > demonstrated using an MSN message that triggers the crash in the
> > msn_slplink_process_msg function.
> 
> Did anyone try if this can be done by some random user=20
> without authorization and if the victim needs to accept the=20
> file first to trigger this?
> 

My testing showed that random users can't send files, they need to be in
your buddy list.  I'm not sure if the victim needs to accept the file or
not.  Last I knew, upstream was still working on this one.

-- 
    JB

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.