Pidgin Security Advisory
| Title | Crash when receiving a UPnP response with abnormally long values |
| Date | 2013-02-13 |
| CVE Name | CVE-2013-0274 |
| Discovered By | Coverity static analysis |
| Description | libpurple failed to null-terminate some strings when parsing the response from a UPnP router. This could lead to a crash if a malicious user on your network responds with a specially crafted message. |
| Fixed in Revision | ad7e7fb98db3 |
| Fixed in Version | 2.10.7 |
| Fix | Use g_strlcpy() instead of strncpy() to guarrantee that strings are null-terminated. |
Return to Security Advisory Index