Vulnerability Details : CVE-2011-2943
The irc_msg_who function in msgs.c in the IRC protocol plugin in libpurple 2.8.0 through 2.9.0 in Pidgin before 2.10.0 does not properly validate characters in nicknames, which allows user-assisted remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted nickname that is not properly handled in a WHO response.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2011-2943
- cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:libpurple:2.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:libpurple:2.9.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2011-2943
10.99%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 94 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-2943
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
NIST |
References for CVE-2011-2943
-
http://securitytracker.com/id?1025961
Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code - SecurityTracker
-
http://developer.pidgin.im/viewmtn/revision/diff/5749f9193063800d27bef75c2388f6f9cc2f7f37/with/5c2dba4a7e2e76b76e7f472b88953a4316706d43/libpurple/protocols/irc/msgs.c
pidgin — BitbucketPatch
-
http://www.openwall.com/lists/oss-security/2011/08/20/2
oss-security - CVE request: Pidgin crash
-
http://www.securityfocus.com/bid/49268
Pidgin Denial of Service and Security Bypass Vulnerabilities
-
https://bugzilla.redhat.com/show_bug.cgi?id=722939
722939 – (CVE-2011-2943) CVE-2011-2943 pidgin: Crash in IRC protocol plug-in by listing set of users (/who command) upon session startup
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18005
Repository / Oval Repository
-
http://www.openwall.com/lists/oss-security/2011/08/22/2
oss-security - Re: CVE request: Pidgin crash
-
http://pidgin.im/news/security/?id=53
Pidgin Security AdvisoriesPatch;Vendor Advisory
-
http://developer.pidgin.im/viewmtn/revision/info/5c2dba4a7e2e76b76e7f472b88953a4316706d43
pidgin — BitbucketPatch
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/69340
Pidgin IRC protocol denial of service CVE-2011-2943 Vulnerability Report
Jump to