Rapid7 Vulnerability & Exploit Database

SUSE Linux Security Vulnerability: CVE-2011-3594

Back to Search

SUSE Linux Security Vulnerability: CVE-2011-3594

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
Published
11/04/2011
Created
07/25/2018
Added
12/12/2013
Modified
07/04/2017

Description

The g_markup_escape_text function in the SILC protocol plug-in in libpurple 2.10.0 and earlier, as used in Pidgin and possibly other products, allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with certain versions of glib2.

Solution(s)

  • suse-upgrade-finch
  • suse-upgrade-finch-debuginfo
  • suse-upgrade-finch-devel
  • suse-upgrade-libpurple
  • suse-upgrade-libpurple-branding-opensuse
  • suse-upgrade-libpurple-branding-upstream
  • suse-upgrade-libpurple-debuginfo
  • suse-upgrade-libpurple-devel
  • suse-upgrade-libpurple-lang
  • suse-upgrade-libpurple-meanwhile
  • suse-upgrade-libpurple-meanwhile-debuginfo
  • suse-upgrade-libpurple-mono
  • suse-upgrade-libpurple-tcl
  • suse-upgrade-libpurple-tcl-debuginfo
  • suse-upgrade-pidgin
  • suse-upgrade-pidgin-branding-opensuse
  • suse-upgrade-pidgin-debuginfo
  • suse-upgrade-pidgin-debugsource
  • suse-upgrade-pidgin-devel
  • suse-upgrade-pidgin-evolution
  • suse-upgrade-pidgin-evolution-debuginfo

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;