hugo/content/about/security/advisories/cve-2011-3185-00.md

Fri, 30 Aug 2024 19:33:36 -0500

author
Gary Kramlich <grim@reaperworld.com>
date
Fri, 30 Aug 2024 19:33:36 -0500
changeset 543
4ab2b8637540
parent 399
0ec2c139628a
permissions
-rw-r--r--

Update the plugins page for the new process

This includes defining the process and providing a template for a new issue to
add new plugins. I did go through and audit `No IRC /WHO` so we had at least
one validated entry.

Testing Done:
Ran `npm run hugo:server` locally and verified the page worked and checked the new links.

Bugs closed: NEST-53

Reviewed at https://reviews.imfreedom.org/r/3450/

---
title: cve-2011-3185-00
date: 2011-08-20T00:00:00.000Z
cveNumber: cve-2011-3185
summary: Pidgin uses clickable links to untrusted executables
discoveredBy: James Burton, Insomnia Security
fixedInRelease: 2.10.0
type: security
layout: cve
hidden: true
---

### Description

If a user clicks on a file:// URI in a received IM in Windows builds of Pidgin,
Pidgin attempts to execute the file. This can be dangerous if the file:// URI is
a path on a network share.

### Mitigation

Don't attempt to execute files when the user clicks a file:// URI. Instead, open
a file browser at the file's location.

mercurial