Lucene search

K
nessusThis script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.DEBIAN_DLA-542.NASL
HistoryJul 05, 2016 - 12:00 a.m.

Debian DLA-542-1 : pidgin security update

2016-07-0500:00:00
This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
10

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

0.011 Low

EPSS

Percentile

84.2%

Numerous security issues have been identified and fixed in Pidgin in Debian/Wheezy.

CVE-2016-2365

MXIT Markup Command Denial of Service Vulnerability

CVE-2016-2366

MXIT Table Command Denial of Service Vulnerability

CVE-2016-2367

MXIT Avatar Length Memory Disclosure Vulnerability

CVE-2016-2368

MXIT g_snprintf Multiple Buffer Overflow Vulnerabilities

CVE-2016-2369

MXIT CP_SOCK_REC_TERM Denial of Service Vulnerability

CVE-2016-2370

MXIT Custom Resource Denial of Service Vulnerability

CVE-2016-2371

MXIT Extended Profiles Code Execution Vulnerability

CVE-2016-2372

MXIT File Transfer Length Memory Disclosure Vulnerability

CVE-2016-2373

MXIT Contact Mood Denial of Service Vulnerability

CVE-2016-2374

MXIT MultiMX Message Code Execution Vulnerability

CVE-2016-2375

MXIT Suggested Contacts Memory Disclosure Vulnerability

CVE-2016-2376

MXIT read stage 0x3 Code Execution Vulnerability

CVE-2016-2377

MXIT HTTP Content-Length Buffer Overflow Vulnerability

CVE-2016-2378

MXIT get_utf8_string Code Execution Vulnerability

CVE-2016-2380

MXIT mxit_convert_markup_tx Information Leak Vulnerability

CVE-2016-4323

MXIT Splash Image Arbitrary File Overwrite Vulnerability

For Debian 7 ‘Wheezy’, these problems have been fixed in version 2.10.10-1~deb7u2.

We recommend that you upgrade your pidgin packages.

NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Debian Security Advisory DLA-542-1. The text
# itself is copyright (C) Software in the Public Interest, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(91922);
  script_version("2.13");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/11");

  script_cve_id("CVE-2016-2365", "CVE-2016-2366", "CVE-2016-2367", "CVE-2016-2368", "CVE-2016-2369", "CVE-2016-2370", "CVE-2016-2371", "CVE-2016-2372", "CVE-2016-2373", "CVE-2016-2374", "CVE-2016-2375", "CVE-2016-2376", "CVE-2016-2377", "CVE-2016-2378", "CVE-2016-2380", "CVE-2016-4323");

  script_name(english:"Debian DLA-542-1 : pidgin security update");
  script_summary(english:"Checks dpkg output for the updated packages.");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote Debian host is missing a security update."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"Numerous security issues have been identified and fixed in Pidgin in
Debian/Wheezy.

CVE-2016-2365

MXIT Markup Command Denial of Service Vulnerability

CVE-2016-2366

MXIT Table Command Denial of Service Vulnerability

CVE-2016-2367

MXIT Avatar Length Memory Disclosure Vulnerability

CVE-2016-2368

MXIT g_snprintf Multiple Buffer Overflow Vulnerabilities

CVE-2016-2369

MXIT CP_SOCK_REC_TERM Denial of Service Vulnerability

CVE-2016-2370

MXIT Custom Resource Denial of Service Vulnerability

CVE-2016-2371

MXIT Extended Profiles Code Execution Vulnerability

CVE-2016-2372

MXIT File Transfer Length Memory Disclosure Vulnerability

CVE-2016-2373

MXIT Contact Mood Denial of Service Vulnerability

CVE-2016-2374

MXIT MultiMX Message Code Execution Vulnerability

CVE-2016-2375

MXIT Suggested Contacts Memory Disclosure Vulnerability

CVE-2016-2376

MXIT read stage 0x3 Code Execution Vulnerability

CVE-2016-2377

MXIT HTTP Content-Length Buffer Overflow Vulnerability

CVE-2016-2378

MXIT get_utf8_string Code Execution Vulnerability

CVE-2016-2380

MXIT mxit_convert_markup_tx Information Leak Vulnerability

CVE-2016-4323

MXIT Splash Image Arbitrary File Overwrite Vulnerability

For Debian 7 'Wheezy', these problems have been fixed in version
2.10.10-1~deb7u2.

We recommend that you upgrade your pidgin packages.

NOTE: Tenable Network Security has extracted the preceding description
block directly from the DLA security advisory. Tenable has attempted
to automatically clean and format it as much as possible without
introducing additional issues."
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://lists.debian.org/debian-lts-announce/2016/07/msg00003.html"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://packages.debian.org/source/wheezy/pidgin"
  );
  script_set_attribute(attribute:"solution", value:"Upgrade the affected packages.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:finch");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:finch-dev");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:libpurple-bin");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:libpurple-dev");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:libpurple0");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:pidgin");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:pidgin-data");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:pidgin-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:pidgin-dev");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:7.0");

  script_set_attribute(attribute:"patch_publication_date", value:"2016/07/04");
  script_set_attribute(attribute:"plugin_publication_date", value:"2016/07/05");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english:"Debian Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");

  exit(0);
}


include("audit.inc");
include("debian_package.inc");


if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);


flag = 0;
if (deb_check(release:"7.0", prefix:"finch", reference:"2.10.10-1~deb7u2")) flag++;
if (deb_check(release:"7.0", prefix:"finch-dev", reference:"2.10.10-1~deb7u2")) flag++;
if (deb_check(release:"7.0", prefix:"libpurple-bin", reference:"2.10.10-1~deb7u2")) flag++;
if (deb_check(release:"7.0", prefix:"libpurple-dev", reference:"2.10.10-1~deb7u2")) flag++;
if (deb_check(release:"7.0", prefix:"libpurple0", reference:"2.10.10-1~deb7u2")) flag++;
if (deb_check(release:"7.0", prefix:"pidgin", reference:"2.10.10-1~deb7u2")) flag++;
if (deb_check(release:"7.0", prefix:"pidgin-data", reference:"2.10.10-1~deb7u2")) flag++;
if (deb_check(release:"7.0", prefix:"pidgin-dbg", reference:"2.10.10-1~deb7u2")) flag++;
if (deb_check(release:"7.0", prefix:"pidgin-dev", reference:"2.10.10-1~deb7u2")) flag++;

if (flag)
{
  if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());
  else security_hole(0);
  exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
VendorProductVersionCPE
debiandebian_linuxfinchp-cpe:/a:debian:debian_linux:finch
debiandebian_linuxfinch-devp-cpe:/a:debian:debian_linux:finch-dev
debiandebian_linuxlibpurple-binp-cpe:/a:debian:debian_linux:libpurple-bin
debiandebian_linuxlibpurple-devp-cpe:/a:debian:debian_linux:libpurple-dev
debiandebian_linuxlibpurple0p-cpe:/a:debian:debian_linux:libpurple0
debiandebian_linuxpidginp-cpe:/a:debian:debian_linux:pidgin
debiandebian_linuxpidgin-datap-cpe:/a:debian:debian_linux:pidgin-data
debiandebian_linuxpidgin-dbgp-cpe:/a:debian:debian_linux:pidgin-dbg
debiandebian_linuxpidgin-devp-cpe:/a:debian:debian_linux:pidgin-dev
debiandebian_linux7.0cpe:/o:debian:debian_linux:7.0

References

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

0.011 Low

EPSS

Percentile

84.2%