Jump to content

Advisories MDVSA-2009:321: pidgin


paul
 Share

Recommended Posts

Security vulnerabilities has been identified and fixed in pidgin:

 

The NSS plugin in libpurple in Pidgin 2.4.1 does not verify SSL

certificates, which makes it easier for remote attackers to trick

a user into accepting an invalid server certificate for a spoofed

service. (CVE-2008-3532)

 

Pidgin 2.4.1 allows remote attackers to cause a denial of service

(crash) via a long filename that contains certain characters, as

demonstrated using an MSN message that triggers the crash in the

msn_slplink_process_msg function. (CVE-2008-2955)

 

The UPnP functionality in Pidgin 2.0.0, and possibly other versions,

allows remote attackers to trigger the download of arbitrary files

and cause a denial of service (memory or disk consumption) via a UDP

packet that specifies an arbitrary URL. (CVE-2008-2957)

 

Buffer overflow in the XMPP SOCKS5 bytestream server in Pidgin

(formerly Gaim) before 2.5.6 allows remote authenticated users to

execute arbitrary code via vectors involving an outbound XMPP file

transfer. NOTE: some of these details are obtained from third party

information (CVE-2009-1373).

 

Buffer overflow in the decrypt_out function in Pidgin (formerly Gaim)

before 2.5.6 allows remote attackers to cause a denial of service

(application crash) via a QQ packet (CVE-2009-1374).

 

The PurpleCircBuffer implementation in Pidgin (formerly Gaim) before

2.5.6 does not properly maintain a certain buffer, which allows

remote attackers to cause a denial of service (memory corruption

and application crash) via vectors involving the (1) XMPP or (2)

Sametime protocol (CVE-2009-1375).

 

Multiple integer overflows in the msn_slplink_process_msg functions in

the MSN protocol handler in (1) libpurple/protocols/msn/slplink.c and

(2) libpurple/protocols/msnp9/slplink.c in Pidgin (formerly Gaim)

before 2.5.6 on 32-bit platforms allow remote attackers to execute

arbitrary code via a malformed SLP message with a crafted offset

value, leading to buffer overflows. NOTE: this issue exists because

of an incomplete fix for CVE-2008-2927 (CVE-2009-1376).

 

The OSCAR protocol implementation in Pidgin before 2.5.8 misinterprets

the ICQWebMessage message type as the ICQSMS message type, which

allows remote attackers to cause a denial of service (application

crash) via a crafted ICQ web message that triggers allocation of a

large amount of memory (CVE-2009-1889).

 

The msn_slplink_process_msg function in

libpurple/protocols/msn/slplink.c in libpurple, as used in Pidgin

(formerly Gaim) before 2.5.9 and Adium 1.3.5 and earlier, allows

remote attackers to execute arbitrary code or cause a denial of service

(memory corruption and application crash) by sending multiple crafted

SLP (aka MSNSLP) messages to trigger an overwrite of an arbitrary

memory location. NOTE: this issue reportedly exists because of an

incomplete fix for CVE-2009-1376 (CVE-2009-2694).

 

Unspecified vulnerability in Pidgin 2.6.0 allows remote attackers

to cause a denial of service (crash) via a link in a Yahoo IM

(CVE-2009-3025)

 

protocols/jabber/auth.c in libpurple in Pidgin 2.6.0, and possibly

other versions, does not follow the require TLS/SSL preference

when connecting to older Jabber servers that do not follow the XMPP

specification, which causes libpurple to connect to the server without

the expected encryption and allows remote attackers to sniff sessions

(CVE-2009-3026).

 

libpurple/protocols/irc/msgs.c in the IRC protocol plugin in libpurple

in Pidgin before 2.6.2 allows remote IRC servers to cause a denial

of service (NULL pointer dereference and application crash) via a

TOPIC message that lacks a topic string (CVE-2009-2703).

 

The msn_slp_sip_recv function in libpurple/protocols/msn/slp.c in the

MSN protocol plugin in libpurple in Pidgin before 2.6.2 allows remote

attackers to cause a denial of service (NULL pointer dereference

and application crash) via an SLP invite message that lacks certain

required fields, as demonstrated by a malformed message from a KMess

client (CVE-2009-3083).

 

The msn_slp_process_msg function in libpurple/protocols/msn/slpcall.c

in the MSN protocol plugin in libpurple 2.6.0 and 2.6.1, as used in

Pidgin before 2.6.2, allows remote attackers to cause a denial of

service (application crash) via a handwritten (aka Ink) message,

related to an uninitialized variable and the incorrect UTF16-LE

charset name (CVE-2009-3084).

 

The XMPP protocol plugin in libpurple in Pidgin before 2.6.2 does

not properly handle an error IQ stanza during an attempted fetch of

a custom smiley, which allows remote attackers to cause a denial of

service (application crash) via XHTML-IM content with cid: images

(CVE-2009-3085).

 

This update provides pidgin 2.6.2, which is not vulnerable to these

issues.

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
 Share

×
×
  • Create New...