fkie_cve-2011-3594
Vulnerability from fkie_nvd
Published
2011-11-04 21:55
Modified
2025-04-11 00:51
Severity ?
Summary
The g_markup_escape_text function in the SILC protocol plug-in in libpurple 2.10.0 and earlier, as used in Pidgin and possibly other products, allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with certain versions of glib2.
References
secalert@redhat.comhttp://developer.pidgin.im/ticket/14636Exploit
secalert@redhat.comhttp://developer.pidgin.im/viewmtn/revision/diff/be5e66abad2af29604bc794cc4c6600ab12751f3/with/7eb1f6d56cc58bbb5b56b7df53955d36b9b419b8
secalert@redhat.comhttp://pidgin.im/news/security/?id=56
secalert@redhat.comhttp://secunia.com/advisories/46376Vendor Advisory
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2011:183
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2011-1371.html
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=743481
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18034
af854a3a-2127-422b-91ae-364da2661108http://developer.pidgin.im/ticket/14636Exploit
af854a3a-2127-422b-91ae-364da2661108http://developer.pidgin.im/viewmtn/revision/diff/be5e66abad2af29604bc794cc4c6600ab12751f3/with/7eb1f6d56cc58bbb5b56b7df53955d36b9b419b8
af854a3a-2127-422b-91ae-364da2661108http://pidgin.im/news/security/?id=56
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/46376Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2011:183
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2011-1371.html
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=743481
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18034



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E39F2309-88A3-465B-8B00-2AF4F7E5341D",
              "versionEndIncluding": "2.10.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "694E9267-6C77-485A-A387-620C894D0A19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "38121333-EDB4-49D1-8C78-7AC81A5F1694",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07CF32F1-D3F8-40EF-B82A-24B003196BA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8338C31B-AB47-43F3-BA66-E28D42CA11CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "91B46C01-4E42-4574-90C6-9BD48FE5E4C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B650359B-C109-40C1-A202-6D52A47FDC6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "53DD7C31-A4D9-47E0-9B09-821B5922AA0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C90C816-1692-4FDB-AAFA-EB0C0DB34BB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "32C48C29-7D4A-4AA8-8C2C-02A73B659DFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7ED29C88-6ABD-46F2-AD25-BD82A6FD788A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "59FAAAF5-BED0-4AAC-AD65-7760688AE8FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D54940E-FC08-45DD-9F38-B5AAA13E0AA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "08A6A399-2600-4266-A1E5-3230C70777D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E538500B-727D-4BA1-8D03-D3E8D68C64A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3569E38-E238-4F4F-839B-645FA24C75AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9123A9DA-9582-42AB-B6AA-B4B7A88C9462",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "95271D73-B2C5-4BA5-B99B-A742B89F03F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F648DF2-78D0-4462-BD90-5575A2D43858",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0C48CD0-8AE6-490E-9D8E-9EE440FA200D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "60D86CF3-4525-4C64-BF96-73D0B8ABD0BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FF2826-D6DF-4F79-9730-B6C30510D4A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7E4244-968E-451C-8B65-89F5AE90743C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A2B1EE0-7B98-4F65-837E-1E21DA05FCCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "082B4A01-46EF-49D1-AEC2-E85C44B5EC82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C8E11B4-4213-4CBB-AE3E-6DFE060BBF81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E8CE5BE-03B4-4556-8ADE-6E645AD211F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BDC1AE-C390-42D5-A0EF-80A59C350F5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E95A0047-BB16-4349-9DF1-76785E14DE98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C610601F-0E26-4D8B-916B-0D26F15C875A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "00D8C461-E1A7-45B1-8C93-C67AA89FE5AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A948803-6E2C-468B-8B48-30ABBE58A87A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "68F91086-15BD-4E7C-995F-99B7894C1BE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "06547B5C-62AA-47EB-825B-CD2CF5FEE285",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F31DD21-BDA2-4860-A801-F88F4B3A46E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "70DDABE1-FA78-4A04-B6CC-923061168916",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "36B72FCA-745A-42D8-8BDD-BD2503AAFE4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADF3C837-FAF9-4F1E-9659-1DF1C2A4E192",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "81531C20-5115-470A-830E-53FFC3F25AF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CFA8CD4-6108-4B3D-AE8D-482C693F26A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "44E0283D-9A97-4C4C-A11A-BD102D60CCB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "56E61E91-D2B9-46CE-A8E9-F17F7CF4B66F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "A476037A-712E-41AA-A2CA-D1C5624B1D51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.7.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F8BB6C-CB59-490C-AA87-56E17ABC2AEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "85B34BE2-3207-4085-AEE4-134B4687D26B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A07707B-7497-46B0-AD82-6220D465CA5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:libpurple:2.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6BF6251-A20F-4C9A-A484-5D3F0B0C7A0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "87A0BF9F-F7E9-4196-BEF7-800B4C850990",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The g_markup_escape_text function in the SILC protocol plug-in in libpurple 2.10.0 and earlier, as used in Pidgin and possibly other products, allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with certain versions of glib2."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n g_markup_escape_text en el complemento de protocolo SILC en libpurple v2.10.0 y anteriores, como se usa en Pidgin y posiblemente en otros productos, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de secuencias UTF-8 inv\u00e1lidas que disparan el uso de punteros no v\u00e1lidos y lectura fuera de los l\u00edmites, relacionado con interacciones con ciertas versiones de glib2"
    }
  ],
  "id": "CVE-2011-3594",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-11-04T21:55:07.083",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://developer.pidgin.im/ticket/14636"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://developer.pidgin.im/viewmtn/revision/diff/be5e66abad2af29604bc794cc4c6600ab12751f3/with/7eb1f6d56cc58bbb5b56b7df53955d36b9b419b8"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://pidgin.im/news/security/?id=56"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/46376"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:183"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-1371.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=743481"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18034"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://developer.pidgin.im/ticket/14636"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://developer.pidgin.im/viewmtn/revision/diff/be5e66abad2af29604bc794cc4c6600ab12751f3/with/7eb1f6d56cc58bbb5b56b7df53955d36b9b419b8"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://pidgin.im/news/security/?id=56"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/46376"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:183"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-1371.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=743481"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18034"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…