|From:||Bonnie King <firstname.lastname@example.org>|
|Subject:||Security ERRATA Moderate: pidgin on SL5.x, SL6.x i386/x86_64|
|Date:||Wed, 5 Feb 2014 19:02:44 +0000|
Synopsis: Moderate: pidgin security update Advisory ID: SLSA-2014:0139-1 Issue Date: 2014-02-05 CVE Numbers: CVE-2012-6152 CVE-2013-6477 CVE-2013-6478 CVE-2013-6479 CVE-2013-6481 CVE-2013-6482 CVE-2013-6483 CVE-2013-6484 CVE-2013-6485 CVE-2013-6487 CVE-2013-6489 CVE-2013-6490 CVE-2014-0020 -- A heap-based buffer overflow flaw was found in the way Pidgin processed certain HTTP responses. A malicious server could send a specially crafted HTTP response, causing Pidgin to crash or potentially execute arbitrary code with the permissions of the user running Pidgin. (CVE-2013-6485) Multiple heap-based buffer overflow flaws were found in several protocol plug-ins in Pidgin (Gadu-Gadu, MXit, SIMPLE). A malicious server could send a specially crafted message, causing Pidgin to crash or potentially execute arbitrary code with the permissions of the user running Pidgin. (CVE-2013-6487, CVE-2013-6489, CVE-2013-6490) Multiple denial of service flaws were found in several protocol plug-ins in Pidgin (Yahoo!, XMPP, MSN, stun, IRC). A remote attacker could use these flaws to crash Pidgin by sending a specially crafted message. (CVE-2012-6152, CVE-2013-6477, CVE-2013-6481, CVE-2013-6482, CVE-2013-6484, CVE-2014-0020) It was found that the Pidgin XMPP protocol plug-in did not verify the origin of "iq" replies. A remote attacker could use this flaw to spoof an "iq" reply, which could lead to injection of fake data or cause Pidgin to crash via a NULL pointer dereference. (CVE-2013-6483) A flaw was found in the way Pidgin parsed certain HTTP response headers. A remote attacker could use this flaw to crash Pidgin via a specially crafted HTTP response header. (CVE-2013-6479) It was found that Pidgin crashed when a mouse pointer was hovered over a long URL. A remote attacker could use this flaw to crash Pidgin by sending a message containing a long URL string. (CVE-2013-6478) Pidgin must be restarted for this update to take effect. -- SL5 x86_64 finch-2.6.6-32.el5.i386.rpm finch-2.6.6-32.el5.x86_64.rpm libpurple-2.6.6-32.el5.i386.rpm libpurple-2.6.6-32.el5.x86_64.rpm libpurple-perl-2.6.6-32.el5.x86_64.rpm libpurple-tcl-2.6.6-32.el5.x86_64.rpm pidgin-2.6.6-32.el5.i386.rpm pidgin-2.6.6-32.el5.x86_64.rpm pidgin-debuginfo-2.6.6-32.el5.i386.rpm pidgin-debuginfo-2.6.6-32.el5.x86_64.rpm pidgin-perl-2.6.6-32.el5.x86_64.rpm finch-devel-2.6.6-32.el5.i386.rpm finch-devel-2.6.6-32.el5.x86_64.rpm libpurple-devel-2.6.6-32.el5.i386.rpm libpurple-devel-2.6.6-32.el5.x86_64.rpm pidgin-devel-2.6.6-32.el5.i386.rpm pidgin-devel-2.6.6-32.el5.x86_64.rpm i386 finch-2.6.6-32.el5.i386.rpm libpurple-2.6.6-32.el5.i386.rpm libpurple-perl-2.6.6-32.el5.i386.rpm libpurple-tcl-2.6.6-32.el5.i386.rpm pidgin-2.6.6-32.el5.i386.rpm pidgin-debuginfo-2.6.6-32.el5.i386.rpm pidgin-perl-2.6.6-32.el5.i386.rpm finch-devel-2.6.6-32.el5.i386.rpm libpurple-devel-2.6.6-32.el5.i386.rpm pidgin-devel-2.6.6-32.el5.i386.rpm SL6 x86_64 libpurple-2.7.9-27.el6.i686.rpm libpurple-2.7.9-27.el6.x86_64.rpm pidgin-2.7.9-27.el6.x86_64.rpm pidgin-debuginfo-2.7.9-27.el6.i686.rpm pidgin-debuginfo-2.7.9-27.el6.x86_64.rpm finch-2.7.9-27.el6.i686.rpm finch-2.7.9-27.el6.x86_64.rpm finch-devel-2.7.9-27.el6.i686.rpm finch-devel-2.7.9-27.el6.x86_64.rpm libpurple-devel-2.7.9-27.el6.i686.rpm libpurple-devel-2.7.9-27.el6.x86_64.rpm libpurple-perl-2.7.9-27.el6.x86_64.rpm libpurple-tcl-2.7.9-27.el6.x86_64.rpm pidgin-devel-2.7.9-27.el6.i686.rpm pidgin-devel-2.7.9-27.el6.x86_64.rpm pidgin-docs-2.7.9-27.el6.x86_64.rpm pidgin-perl-2.7.9-27.el6.x86_64.rpm i386 libpurple-2.7.9-27.el6.i686.rpm pidgin-2.7.9-27.el6.i686.rpm pidgin-debuginfo-2.7.9-27.el6.i686.rpm finch-2.7.9-27.el6.i686.rpm finch-devel-2.7.9-27.el6.i686.rpm libpurple-devel-2.7.9-27.el6.i686.rpm libpurple-perl-2.7.9-27.el6.i686.rpm libpurple-tcl-2.7.9-27.el6.i686.rpm pidgin-devel-2.7.9-27.el6.i686.rpm pidgin-docs-2.7.9-27.el6.i686.rpm pidgin-perl-2.7.9-27.el6.i686.rpm - Scientific Linux Development Team
Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds