LWN.net Logo

pidgin: multiple vulnerabilities

Package(s):pidgin CVE #(s):CVE-2013-0271 CVE-2013-0272 CVE-2013-0273 CVE-2013-0274
Created:February 14, 2013 Updated:March 21, 2013
Description:

From the Pidgin advisories:

CVE-2013-0271: The MXit protocol plugin saves an image to local disk using a filename that could potentially be partially specified by the IM server or by a remote user.

CVE-2013-0272: The code did not respect the size of the buffer when parsing HTTP headers, and a malicious server or man-in-the-middle could send specially crafted data that could overflow the buffer. This could lead to a crash or remote code execution.

CVE-2013-0273: libpurple failed to null-terminate user IDs that were longer than 4096 bytes. It's plausible that a malicious server could send one of these to us, which would lead to a crash.

CVE-2013-0274: libpurple failed to null-terminate some strings when parsing the response from a UPnP router. This could lead to a crash if a malicious user on your network responds with a specially crafted message.

Alerts:
Slackware SSA:2013-044-01 2013-02-13
Mageia MGASA-2013-0058 2013-02-21
Ubuntu USN-1746-1 2013-02-25
SUSE SUSE-SU-2013:0388-1 2013-03-04
openSUSE openSUSE-SU-2013:0407-1 2013-03-07
openSUSE openSUSE-SU-2013:0405-1 2013-03-07
Mandriva MDVSA-2013:025 2013-03-14
Red Hat RHSA-2013:0646-01 2013-03-14
CentOS CESA-2013:0646 2013-03-14
Oracle ELSA-2013-0646 2013-03-14
Scientific Linux SL-pidg-20130314 2013-03-14
openSUSE openSUSE-SU-2013:0511-1 2013-03-21

(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds