OTR protocol implementation vulnerability affects open source IM software such as Pidgin
Many security instant chat tools, such as ChatSecure, Pidgin, Adium, and Kopete, use the Off-the-Record (OTR) Protocol to implement library libotr and discover a high-risk vulnerability, attackers can exploit this vulnerability to crash chat tools or remotely execute code, intrude into the victim's computer, and steal keys and chat logs. This vulnerability can be triggered by sending a specially crafted message. Attackers do not need to be added to the contact list of the victim, and do not need user interaction or authorization. The vulnerability exists in libotr 4.1 and earlier versions. The developer has released libotr v4.1.1 to fix the vulnerability, and all major chat tools have released updates.
This article permanently updates the link address: