|Remote crash in MSN protocol plugin
|Fixed In Release
Incorrect handling of HTTP 100 responses in the MSN protocol plugin can cause the application to attempt to access memory that it does not have access to. This only affects users who have turned on the HTTP connection method for their accounts (it’s off by default). This might only be triggerable by a malicious server and not a malicious peer. We believe remote code execution is not possible.
Correctly take into account the size of HTTP 100 response when parsing server messages.