It is compatible with AIM and ICQ (Oscar protocol), MSN Messenger, Yahoo!, IRC, Jabber, Gadu-Gadu, SILC, Novell GroupWise Messenger, Lotus Sametime, and Zephyr networks. Gaim users can log in to multiple accounts on multiple IM networks simultaneously. This means that you can be chatting with friends on AOL Instant Messenger, talking to a friend on Yahoo Messenger, and sitting in an IRC channel all at the same time.
Pidgin supports many features of the various networks, such as file transfer, away messages, and typing notification. It also goes beyond that and provides many unique features. A few popular features are Buddy Pounces, which give the ability to notify you, send a message, play a sound, or run a program when a specific buddy goes away, signs online, or returns from idle; and plugins, consisting of text replacement, a buddy ticker, extended message notification, iconify on away, spell checking, tabbed conversations, and more. Pidgin runs on a number of platforms, including Windows, Linux, and Qtopia (Sharp Zaurus and iPaq).
- Python build scripts and example plugins are now compatible with Python 3. (Ashish Gupta) (#15624)
- Fix potential crash if libpurple gets an error attempting to read a reply from a STUN server. (Discovered by Coverity static analysis) (CVE-2013-6484)
- Fix potential crash parsing a malformed HTTP response. (Discovered by Jacob Appelbaum of the Tor Project) (CVE-2013-6479)
- Fix buffer overflow when parsing a malformed HTTP response with chunked Transfer-Encoding. (Discovered by Matt Jones, Volvent) (CVE-2013-6485)
- Better handling of HTTP proxy responses with negative Content-Lengths. (Discovered by Matt Jones, Volvent)
- Fix handling of SSL certificates without subjects when using libnss.
- Fix handling of SSL certificates with timestamps in the distant future when using libnss. (#15586)
- Impose maximum download size for all HTTP fetches.
- Fix crash displaying tooltip of long URLs. (CVE-2013-6478)
- Better handling of URLs longer than 1000 letters.
- Fix handling of multibyte UTF-8 characters in smiley themes. (#15756)
- Windows-Specific Changes
- When clicking file:// links, show the file in Explorer rather than attempting to run the file. This reduces the chances of a user clicking on a link and mistakenly running a malicious file. (Originally discovered by James Burton, Insomnia Security. Rediscovered by Yves Younan of Sourcefire VRT.) (CVE-2013-6486)
- Fix Tcl scripts. (#15520)
- Fix crash-on-startup when ASLR is always on. (#15521)
- Updates to dependencies:
- NSS 3.15.4 and NSPR 4.10.2
- Pango 1.29.4-1daa. Patched for https://bugzilla.gnome.org/show_bug.cgi?id=668154
- Fix untrusted certificate error.
- AIM and ICQ
- Fix a possible crash when receiving a malformed message in a Direct IM session.
- Fix buffer overflow with remote code execution potential. Only triggerable by a Gadu-Gadu server or a man-in-the-middle. (Discovered by Yves Younan and Ryan Pentney of Sourcefire VRT) (CVE-2013-6487)
- Disabled buddy list import/export from/to server (it didn't work anymore). Buddy list synchronization will be implemented in 3.0.0.
- Disabled new account registration and password change options, as it didn't work either. Account registration also caused a crash. Both functions are available using official Gadu-Gadu website.
- Fix bug where a malicious server or man-in-the-middle could trigger a crash by not sending enough arguments with various messages. (Discovered by Daniel Atallah) (CVE-2014-0020)
- Fix bug where initial IRC status would not be set correctly.
- Fix bug where IRC wasn't available when libpurple was compiled with Cyrus SASL support. (#15517)
- Fix NULL pointer dereference parsing headers in MSN. (Discovered by Fabian Yamaguchi and Christian Wressnegger of the University of Goettingen) (CVE-2013-6482)
- Fix NULL pointer dereference parsing OIM data in MSN. (Discovered by Fabian Yamaguchi and Christian Wressnegger of the University of Goettingen) (CVE-2013-6482)
- Fix NULL pointer dereference parsing SOAP data in MSN. (Discovered by Fabian Yamaguchi and Christian Wressnegger of the University of Goettingen) (CVE-2013-6482)
- Fix possible crash when sending very long messages. Not remotely-triggerable. (Discovered by Matt Jones, Volvent)
- Fix buffer overflow with remote code execution potential. (Discovered by Yves Younan and Pawel Janic of Sourcefire VRT) (CVE-2013-6489)
- Fix sporadic crashes that can happen after user is disconnected.
- Fix crash when attempting to add a contact via search results.
- Show error message if file transfer fails.
- Fix compiling with InstantBird.
- Fix display of some custom emoticons.
- Correctly set whiteboard dimensions in whiteboard sessions.
- Fix buffer overflow with remote code execution potential. (Discovered by Yves Younan of Sourcefire VRT) (CVE-2013-6490)
- Prevent spoofing of iq replies by verifying that the 'from' address matches the 'to' address of the iq request. (Discovered by Fabian Yamaguchi and Christian Wressnegger of the University of Goettingen, fixed by Thijs Alkemade) (CVE-2013-6483)
- Fix crash on some systems when receiving fake delay timestamps with extreme values. (Discovered by Jaime Breva Ribes) (CVE-2013-6477)
- Fix possible crash or other erratic behavior when selecting a very small file for your own buddy icon.
- Fix crash if the user tries to initiate a voice/video session with a resourceless JID.
- Fix login errors when the first two available auth mechanisms fail but a subsequent mechanism would otherwise work when using Cyrus SASL. (#15524)
- Fix dropping incoming stanzas on BOSH connections when we receive multiple HTTP responses at once. (Issa Gorissen) (#15684)
- Fix possible crashes handling incoming strings that are not UTF-8. (Discovered by Thijs Alkemade and Robert Vehse) (CVE-2012-6152)
- Fix a bug reading a peer to peer message where a remote user could trigger a crash. (CVE-2013-6481)
- Fix crash in contact availability plugin.
- Fix perl function Purple::Network::ip_atoi
- Add Unity integration plugin.
From the Forums
Subscribe to TechSpot
Receive a weekly update of our best features and tech news you don't want to miss: