9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.203 Low
EPSS
Percentile
96.3%
CentOS Errata and Security Advisory CESA-2009:1060
Pidgin is an instant messaging program which can log in to multiple
accounts on multiple instant messaging networks simultaneously.
A buffer overflow flaw was found in the way Pidgin initiates file transfers
when using the Extensible Messaging and Presence Protocol (XMPP). If a
Pidgin client initiates a file transfer, and the remote target sends a
malformed response, it could cause Pidgin to crash or, potentially, execute
arbitrary code with the permissions of the user running Pidgin. This flaw
only affects accounts using XMPP, such as Jabber and Google Talk.
(CVE-2009-1373)
A denial of service flaw was found in Pidginβs QQ protocol decryption
handler. When the QQ protocol decrypts packet information, heap data can be
overwritten, possibly causing Pidgin to crash. (CVE-2009-1374)
A flaw was found in the way Pidginβs PurpleCircBuffer object is expanded.
If the buffer is full when more data arrives, the data stored in this
buffer becomes corrupted. This corrupted data could result in confusing or
misleading data being presented to the user, or possibly crash Pidgin.
(CVE-2009-1375)
It was discovered that on 32-bit platforms, the Red Hat Security Advisory
RHSA-2008:0584 provided an incomplete fix for the integer overflow flaw
affecting Pidginβs MSN protocol handler. If a Pidgin client receives a
specially-crafted MSN message, it may be possible to execute arbitrary code
with the permissions of the user running Pidgin. (CVE-2009-1376)
Note: By default, when using an MSN account, only users on your buddy list
can send you messages. This prevents arbitrary MSN users from exploiting
this flaw.
All Pidgin users should upgrade to these updated packages, which contain
backported patches to resolve these issues. Pidgin must be restarted for
this update to take effect.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2009-May/078053.html
https://lists.centos.org/pipermail/centos-announce/2009-May/078054.html
https://lists.centos.org/pipermail/centos-announce/2009-May/078099.html
Affected packages:
finch
finch-devel
libpurple
libpurple-devel
libpurple-perl
libpurple-tcl
pidgin
pidgin-devel
pidgin-perl
Upstream details at:
https://access.redhat.com/errata/RHSA-2009:1060
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 5 | i386 | finch | <Β 2.5.5-3.el5 | finch-2.5.5-3.el5.i386.rpm |
CentOS | 5 | i386 | finch-devel | <Β 2.5.5-3.el5 | finch-devel-2.5.5-3.el5.i386.rpm |
CentOS | 5 | i386 | libpurple | <Β 2.5.5-3.el5 | libpurple-2.5.5-3.el5.i386.rpm |
CentOS | 5 | i386 | libpurple-devel | <Β 2.5.5-3.el5 | libpurple-devel-2.5.5-3.el5.i386.rpm |
CentOS | 5 | i386 | libpurple-perl | <Β 2.5.5-3.el5 | libpurple-perl-2.5.5-3.el5.i386.rpm |
CentOS | 5 | i386 | libpurple-tcl | <Β 2.5.5-3.el5 | libpurple-tcl-2.5.5-3.el5.i386.rpm |
CentOS | 5 | i386 | pidgin | <Β 2.5.5-3.el5 | pidgin-2.5.5-3.el5.i386.rpm |
CentOS | 5 | i386 | pidgin-devel | <Β 2.5.5-3.el5 | pidgin-devel-2.5.5-3.el5.i386.rpm |
CentOS | 5 | i386 | pidgin-perl | <Β 2.5.5-3.el5 | pidgin-perl-2.5.5-3.el5.i386.rpm |
CentOS | 5 | i386 | finch | <Β 2.5.5-3.el5 | finch-2.5.5-3.el5.i386.rpm |