Public Date:
514957: CVE-2009-2694 pidgin: insufficient input validation in msn_slplink_process_msg()

The MITRE CVE dictionary describes this issue as:

The msn_slplink_process_msg function in libpurple/protocols/msn/slplink.c in libpurple, as used in Pidgin (formerly Gaim) before 2.5.9 and Adium 1.3.5 and earlier, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) by sending multiple crafted SLP (aka MSNSLP) messages to trigger an overwrite of an arbitrary memory location. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-1376.

Find out more about CVE-2009-2694 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

Base Score 7.5
Base Metrics AV:N/AC:L/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 5 (pidgin) RHSA-2009:1218 2009-08-18
Red Hat Enterprise Linux 3 (pidgin) RHSA-2009:1218 2009-08-18
Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server) (pidgin) RHSA-2009:1218 2009-08-18
Red Hat Enterprise Linux 4 (pidgin) RHSA-2009:1218 2009-08-18


Users can lower the impact of this flaw by making sure their privacy settings only allow Pidgin to accept messages from the users on their buddy list. This will prevent exploitation of this flaw by other random MSN users.

Last Modified

CVE description copyright © 2017, The MITRE Corporation


Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.