Lucene search

K
debianDebianDEBIAN:E44964473779E950E1CB636C11BFB253:E455D
HistoryOct 27, 2008 - 7:16 p.m.

[Backports-security-announce] Security Update for pidgin

2008-10-2719:16:04
lists.debian.org
8

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

0.044 Low

EPSS

Percentile

92.4%

Gerfried Fuchs uploaded new packages for pidgin which fixed the
following security problem:

CVE-2008-2957, Debian Bug #488632

The UPnP functionality in Pidgin 2.0.0, and possibly other versions,
allows remote attackers to trigger the download of arbitrary files and
cause a denial of service (memory or disk consumption) via a UDP
packet that specifies an arbitrary URL.

For the etch-backports distribution the problem has been fixed in
version 2.4.3-4~bpo40+1

For the lenny and sid distributions the problem has been fixed in
version 2.4.3-4.

Upgrade instructions

If you don't use pinning (see [1]) you have to update the packages
manually via "apt-get -t etch-backports install <packagelist>" with the
packagelist of your installed packages affected by this update.
[1] <http://backports.org/dokuwiki/doku.php?id=instructions&gt;

We recommend to pin the backports repository to 200 so that new versions
of installed backports will be installed automatically:

Package: *
Pin: release a=etch-backports
Pin-Priority: 200
Attachment:
signature.asc
Description: Digital signature

OSVersionArchitecturePackageVersionFilename
Debian999allpidgin< 2.4pidgin_2.4_all.deb
Debian5allpidgin< 2.4pidgin_2.4_all.deb

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

0.044 Low

EPSS

Percentile

92.4%