FreshPorts - VuXML
This page displays vulnerability information about FreeBSD Ports.
The last vuln.xml file processed by FreshPorts is:
List all Vulnerabilities, by package
List all Vulnerabilities, by date
These are the vulnerabilities relating to the commit you have selected:
|59e7af2d-8db7-11de-883b-001e3300a30d||pidgin -- MSN overflow parsing SLP messages|
A vulnerability has been reported in Pidgin, which can be
exploited by malicious people to potentially compromise a user's
The vulnerability is caused due to an error in the
"msn_slplink_process_msg()" function when processing MSN SLP
messages and can be exploited to corrupt memory.
Successful exploitation may allow execution of arbitrary
The vulnerability is reported in versions 2.5.8 and prior.
Other versions may also be affected.
|b1ca65e6-5aaf-11de-bc9b-0030843d3802||pidgin -- multiple vulnerabilities|
Some vulnerabilities and weaknesses have been reported in Pidgin,
which can be exploited by malicious people to cause a DoS or to
potentially compromise a user's system.
A truncation error in the processing of MSN SLP messages can be
exploited to cause a buffer overflow.
A boundary error in the XMPP SOCKS5 "bytestream" server when
initiating an outgoing file transfer can be exploited to cause a
A boundary error exists in the implementation of the
"PurpleCircBuffer" structure. This can be exploited to corrupt memory
and cause a crash via specially crafted XMPP or Sametime
A boundary error in the "decrypt_out()" function can be exploited
to cause a stack-based buffer overflow with 8 bytes and crash the
application via a specially crafted QQ packet.