CVE-2009-1373

Source
https://nvd.nist.gov/vuln/detail/CVE-2009-1373
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2009-1373.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2009-1373
Related
Published
2009-05-26T15:30:05Z
Modified
2024-09-18T01:00:20Z
Summary
[none]
Details

Buffer overflow in the XMPP SOCKS5 bytestream server in Pidgin (formerly Gaim) before 2.5.6 allows remote authenticated users to execute arbitrary code via vectors involving an outbound XMPP file transfer. NOTE: some of these details are obtained from third party information.

References

Affected packages

Debian:11 / pidgin

Package

Name
pidgin
Purl
pkg:deb/debian/pidgin?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.5.6-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / pidgin

Package

Name
pidgin
Purl
pkg:deb/debian/pidgin?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.5.6-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / pidgin

Package

Name
pidgin
Purl
pkg:deb/debian/pidgin?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.5.6-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}