CVE-2008-2927

Current Description

Multiple integer overflows in the msn_slplink_process_msg functions in the MSN protocol handler in (1) libpurple/protocols/msn/slplink.c and (2) libpurple/protocols/msnp9/slplink.c in Pidgin before 2.4.3 and Adium before 1.3 allow remote attackers to execute arbitrary code via a malformed SLP message with a crafted offset value, a different vulnerability than CVE-2008-2955.

Referenced by CVEs:CVE-2009-1376

Basic Data

PublishedJuly 07, 2008
Last ModifiedOctober 11, 2018
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-189
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityMEDIUM
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score6.8
SeverityMEDIUM
Exploitability Score8.6
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegetrue

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationPidginPidgin2.0.0*******
    2.3ApplicationPidginPidgin2.0.1*******
    2.3ApplicationPidginPidgin2.0.2*******
    2.3ApplicationPidginPidgin2.1.0*******
    2.3ApplicationPidginPidgin2.1.1*******
    2.3ApplicationPidginPidgin2.2.0*******
    2.3ApplicationPidginPidgin2.2.1*******
    2.3ApplicationPidginPidgin2.2.2*******
    2.3ApplicationPidginPidgin2.3.0*******
    2.3ApplicationPidginPidgin2.3.1*******
    2.3ApplicationPidginPidgin2.4.0*******
    2.3ApplicationPidginPidgin2.4.1*******
    2.3ApplicationPidginPidgin********2.4.2
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationAdiumAdium1.0*******
    2.3ApplicationAdiumAdium1.0.1*******
    2.3ApplicationAdiumAdium1.0.2*******
    2.3ApplicationAdiumAdium1.0.3*******
    2.3ApplicationAdiumAdium1.0.4*******
    2.3ApplicationAdiumAdium1.0.5*******
    2.3ApplicationAdiumAdium1.1*******
    2.3ApplicationAdiumAdium1.1.1*******
    2.3ApplicationAdiumAdium1.1.2*******
    2.3ApplicationAdiumAdium1.1.3*******
    2.3ApplicationAdiumAdium1.1.4*******
    2.3ApplicationAdiumAdium********1.2.7

Vulnerable Software List

VendorProductVersions
Adium Adium *, 1.0, 1.0.1, 1.0.2, 1.0.3, 1.0.4, 1.0.5, 1.1, 1.1.1, 1.1.2, 1.1.3, 1.1.4
Pidgin Pidgin *, 2.0.0, 2.0.1, 2.0.2, 2.1.0, 2.1.1, 2.2.0, 2.2.1, 2.2.2, 2.3.0, 2.3.1, 2.4.0, 2.4.1

References

NameSourceURLTags
http://developer.pidgin.im/viewmtn/revision/diff/6eb1949a96fa80a4c744fc749c2562abc4cc9ed6/with/c3831c9181f4f61b747321240086ee79e4a08fd8/libpurple/protocols/msn/slplink.chttp://developer.pidgin.im/viewmtn/revision/diff/6eb1949a96fa80a4c744fc749c2562abc4cc9ed6/with/c3831CONFIRM
http://developer.pidgin.im/viewmtn/revision/diff/6eb1949a96fa80a4c744fc749c2562abc4cc9ed6/with/c3831c9181f4f61b747321240086ee79e4a08fd8/libpurple/protocols/msnp9/slplink.chttp://developer.pidgin.im/viewmtn/revision/diff/6eb1949a96fa80a4c744fc749c2562abc4cc9ed6/with/c3831CONFIRM
30971http://secunia.com/advisories/30971SECUNIAVendor Advisory
31016http://secunia.com/advisories/31016SECUNIAVendor Advisory
31105http://secunia.com/advisories/31105SECUNIAVendor Advisory
31387http://secunia.com/advisories/31387SECUNIAVendor Advisory
31642http://secunia.com/advisories/31642SECUNIAVendor Advisory
32859http://secunia.com/advisories/32859SECUNIA
32861http://secunia.com/advisories/32861SECUNIA
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0246http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0246CONFIRM
DSA-1610http://www.debian.org/security/2008/dsa-1610DEBIAN
MDVSA-2008:143http://www.mandriva.com/security/advisories?name=MDVSA-2008:143MANDRIVA
MDVSA-2009:127http://www.mandriva.com/security/advisories?name=MDVSA-2009:127MANDRIVA
[oss-security] 20080704 Re: Re: CVE Request (pidgin)http://www.openwall.com/lists/oss-security/2008/07/03/6MLIST
[oss-security] 20080703 Re: Re: CVE Request (pidgin)http://www.openwall.com/lists/oss-security/2008/07/04/1MLIST
http://www.pidgin.im/news/security/?id=25http://www.pidgin.im/news/security/?id=25CONFIRM
RHSA-2008:0584http://www.redhat.com/support/errata/RHSA-2008-0584.htmlREDHAT
20080625 Pidgin 2.4.1 Vulnerabilityhttp://www.securityfocus.com/archive/1/493682BUGTRAQ
20080806 rPSA-2008-0246-1 gaimhttp://www.securityfocus.com/archive/1/495165/100/0/threadedBUGTRAQ
20080828 ZDI-08-054: Multiple Vendor libpurple MSN Protocol SLP Message Heap Overflow Vulnerabilityhttp://www.securityfocus.com/archive/1/495818/100/0/threadedBUGTRAQ
29956http://www.securityfocus.com/bid/29956BID
1020451http://www.securitytracker.com/id?1020451SECTRACK
USN-675-1http://www.ubuntu.com/usn/USN-675-1UBUNTU
USN-675-2http://www.ubuntu.com/usn/USN-675-2UBUNTU
ADV-2008-2032http://www.vupen.com/english/advisories/2008/2032/referencesVUPENVendor Advisory
http://www.zerodayinitiative.com/advisories/ZDI-08-054http://www.zerodayinitiative.com/advisories/ZDI-08-054MISC
https://bugzilla.redhat.com/show_bug.cgi?id=453764https://bugzilla.redhat.com/show_bug.cgi?id=453764CONFIRM
adium-msnprotocol-code-execution(44774)https://exchange.xforce.ibmcloud.com/vulnerabilities/44774XF
https://issues.rpath.com/browse/RPL-2647https://issues.rpath.com/browse/RPL-2647CONFIRM
oval:org.mitre.oval:def:11695https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11695OVAL
oval:org.mitre.oval:def:17972https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17972OVAL