gtkutils.c in Pidgin before 2.10.0 on Windows allows user-assisted remote attackers to execute arbitrary programs via a file: URL in a message.
developer.pidgin.im/viewmtn/revision/diff/29484df15413fe3bbd21bbfcef26a55362055a81/with/5749f9193063800d27bef75c2388f6f9cc2f7f37/pidgin/gtkutils.c
developer.pidgin.im/viewmtn/revision/info/5749f9193063800d27bef75c2388f6f9cc2f7f37
pidgin.im/news/security/?id=55
secunia.com/advisories/45663
securitytracker.com/id?1025961
www.insomniasec.com/advisories/ISVA-110822.1.htm
www.openwall.com/lists/oss-security/2011/08/22/
www.openwall.com/lists/oss-security/2011/08/22/10
www.openwall.com/lists/oss-security/2011/08/22/12
www.openwall.com/lists/oss-security/2011/08/22/7
www.securityfocus.com/archive/1/519391/100/0/threaded
www.securityfocus.com/bid/49268
exchange.xforce.ibmcloud.com/vulnerabilities/69342
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18324