Lucene search

K
nessusThis script is Copyright (C) 2009-2018 Tenable Network Security, Inc.PIDGIN_2_5_9.NASL
HistoryAug 20, 2009 - 12:00 a.m.

Pidgin < 2.5.9 'msn_slplink_process_msg()' Memory Corruption

2009-08-2000:00:00
This script is Copyright (C) 2009-2018 Tenable Network Security, Inc.
www.tenable.com
14

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.125 Low

EPSS

Percentile

95.4%

The version of Pidgin installed on the remote host is earlier than 2.5.9. Such versions are reportedly affected by a vulnerability in β€˜msn_slplink_process_msg()’. Maliciously crafted MSN SLP messages can result in memory corruption. A remote attacker could use this to crash the client, or execute arbitrary code.

This attack does not require user interaction or that the attacker is in the victim’s buddy list (using the default configuration).

#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");


if (description)
{
  script_id(40663);
  script_version("1.11");

  script_cve_id("CVE-2009-2694");
  script_bugtraq_id(36071);
  script_xref(name:"Secunia", value:"36384");

  script_name(english:"Pidgin < 2.5.9 'msn_slplink_process_msg()' Memory Corruption");
  script_summary(english:"Does a version check");

  script_set_attribute( attribute:"synopsis", value:
"The remote host has an instant messaging client that is affected by a
memory corruption vulnerability."  );
  script_set_attribute( attribute:"description", value:
"The version of Pidgin installed on the remote host is earlier than
2.5.9.  Such versions are reportedly affected by a vulnerability in
'msn_slplink_process_msg()'.  Maliciously crafted MSN SLP messages
can result in memory corruption.  A remote attacker could use this to
crash the client, or execute arbitrary code.

This attack does not require user interaction or that the attacker
is in the victim's buddy list (using the default configuration)."  );
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.coresecurity.com/content/libpurple-arbitrary-write"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://seclists.org/bugtraq/2009/Aug/174"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"http://pidgin.im/news/security/?id=34"
  );
  script_set_attribute(
    attribute:"solution",
    value:"Upgrade to Pidgin 2.5.9 or later."
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
 script_set_attribute(attribute:"exploit_framework_core", value:"true");
 script_cwe_id(399);
  script_set_attribute(
    attribute:"vuln_publication_date",
    value:"2009/08/18"
  );
  script_set_attribute(
    attribute:"patch_publication_date",
    value:"2009/08/18"
  );
  script_set_attribute(
    attribute:"plugin_publication_date",
    value:"2009/08/20"
  );
 script_cvs_date("Date: 2018/11/15 20:50:28");
  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:pidgin:pidgin");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2009-2018 Tenable Network Security, Inc.");

  script_dependencies("pidgin_installed.nasl");
  script_require_keys("SMB/Pidgin/Version");

  exit(0);
}


include("global_settings.inc");


version = get_kb_item("SMB/Pidgin/Version");
if (isnull(version)) exit(1, "The 'SMB/Pidgin/Version' KB item is missing.");

ver_fields = split(version, sep:'.', keep:FALSE);
major = int(ver_fields[0]);
minor = int(ver_fields[1]);
rev = int(ver_fields[2]);

# Versions < 2.5.9 are affected
if (
  major < 2 ||
  (major == 2 && minor < 5) ||
  (major == 2 && minor == 5 && rev < 9)
)
{
  port = get_kb_item("SMB/transport");

  if(report_verbosity > 0)
  {
    report = string(
      "\n",
      "  Installed version  : ", version, "\n",
      "  Should be at least : 2.5.9\n"
    );
    security_hole(port:port, extra:report);
  }
  else security_hole(port);
}
else exit(0, "Version " + version + " is not affected.");

VendorProductVersionCPE
pidginpidgincpe:/a:pidgin:pidgin

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.125 Low

EPSS

Percentile

95.4%