Vulnerability Description
gtkutils.c in Pidgin before 2.10.8 on Windows allows user-assisted remote attackers to execute arbitrary programs via a message containing a file: URL that is improperly handled during construction of an explorer.exe command. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3185.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pidgin | Pidgin | <= 2.10.7 |
Related Weaknesses (CWE)
References
- http://hg.pidgin.im/pidgin/main/rev/b2571530fa8b
- http://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html
- http://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html
- http://pidgin.im/news/security/?id=81Vendor Advisory
- http://www.securityfocus.com/bid/65189
- http://hg.pidgin.im/pidgin/main/rev/b2571530fa8b
- http://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html
- http://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html
- http://pidgin.im/news/security/?id=81Vendor Advisory
- http://www.securityfocus.com/bid/65189
FAQ
What is CVE-2013-6486?
CVE-2013-6486 is a vulnerability with a CVSS score of 9.3 (HIGH). gtkutils.c in Pidgin before 2.10.8 on Windows allows user-assisted remote attackers to execute arbitrary programs via a message containing a file: URL that is improperly handled during construction of...
How severe is CVE-2013-6486?
CVE-2013-6486 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-6486?
Check the references section above for vendor advisories and patch information. Affected products include: Pidgin Pidgin.