|Summary||Pidgin uses clickable links to untrusted executables|
|Discovered By||Originally by James Burton, Insomnia Security. Rediscovered by Yves Younan of Sourcefire VRT.|
|Fixed In Release||2.10.8|
If a user clicks on a file:// URI in a received IM in Windows builds of Pidgin, Pidgin attempts to execute the file. This can be dangerous if the file:// URI is a path on a network share. This was originally reported in CVE-2011-3185 in 2011 and we attempted to fix it then, but failed.
Don’t attempt to execute files when the user clicks a file:// URI. Instead, open a file browser at the file’s location.