pidgin is vulnerable to denial of service (DoS). The vulnerability exists as multiple NULL pointer dereference flaws were found in the way the Pidgin Yahoo! Messenger Protocol plug-in handled malformed YMSG packets. A remote attacker could use these flaws to crash Pidgin via a specially-crafted notification message.
developer.pidgin.im/viewmtn/revision/diff/5cbe18129b6e7c660bc093f7e5e1414ceca17d04/with/a7c415abba1f5f01f79295337518837f73d99bb7/libpurple/protocols/yahoo/libymsg.c
developer.pidgin.im/viewmtn/revision/info/a7c415abba1f5f01f79295337518837f73d99bb7
developer.pidgin.im/wiki/ChangeLog
lists.fedoraproject.org/pipermail/package-announce/2011-March/055874.html
lists.fedoraproject.org/pipermail/package-announce/2011-March/056309.html
secunia.com/advisories/43695
secunia.com/advisories/43721
secunia.com/advisories/46376
slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.466884
www.pidgin.im/news/security/?id=51
www.redhat.com/support/errata/RHSA-2011-0616.html
www.redhat.com/support/errata/RHSA-2011-1371.html
www.securityfocus.com/bid/46837
www.vupen.com/english/advisories/2011/0643
www.vupen.com/english/advisories/2011/0661
www.vupen.com/english/advisories/2011/0669
www.vupen.com/english/advisories/2011/0703
access.redhat.com/errata/RHSA-2011:0616
access.redhat.com/errata/RHSA-2011:1371
access.redhat.com/security/cve/CVE-2011-1091
access.redhat.com/security/updates/classification/#low
bugzilla.redhat.com/show_bug.cgi?id=683031
exchange.xforce.ibmcloud.com/vulnerabilities/66055
hermes.opensuse.org/messages/13195955
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18402