Lucene search

K
nessusThis script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.REDHAT_UNPATCHED-PIDGIN-RHEL5.NASL
HistoryMay 11, 2024 - 12:00 a.m.

RHEL 5 : pidgin (Unpatched Vulnerability)

2024-05-1100:00:00
This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
1
redhat enterprise linux
pidgin
unpatched vulnerabilities
out-of-bounds writes
denial of service
information leak
memory corruption
cve-2017-2640
cve-2016-2365
cve-2016-2366
cve-2016-2367
cve-2016-2368
cve-2016-2369
cve-2016-2370
cve-2016-2371
cve-2016-2372
cve-2016-2373
cve-2016-2374

7.9 High

AI Score

Confidence

High

The remote Redhat Enterprise Linux 5 host has one or more packages installed that are affected by multiple vulnerabilities that have been acknowledged by the vendor but will not be patched.

  • pidgin: Out-of-bounds write in purple_markup_unescape_entity triggered by invalid XML (CVE-2017-2640)

  • A denial of service vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in a null pointer dereference. A malicious server or an attacker who intercepts the network traffic can send invalid data to trigger this vulnerability and cause a crash. (CVE-2016-2365)

  • A denial of service vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in an out-of-bounds read. A malicious server or an attacker who intercepts the network traffic can send invalid data to trigger this vulnerability and cause a crash. (CVE-2016-2366)

  • An information leak exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in an out-of-bounds read. A malicious user, server, or man- in-the-middle can send an invalid size for an avatar which will trigger an out-of-bounds read vulnerability. This could result in a denial of service or copy data from memory to the file, resulting in an information leak if the avatar is sent to another user. (CVE-2016-2367)

  • Multiple memory corruption vulnerabilities exist in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could result in multiple buffer overflows, potentially resulting in code execution or memory disclosure. (CVE-2016-2368)

  • A NULL pointer dereference vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in a denial of service vulnerability. A malicious server can send a packet starting with a NULL byte triggering the vulnerability. (CVE-2016-2369)

  • A denial of service vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent from the server could potentially result in an out-of-bounds read. A malicious server or man-in-the-middle attacker can send invalid data to trigger this vulnerability. (CVE-2016-2370)

  • An out-of-bounds write vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could cause memory corruption resulting in code execution.
    (CVE-2016-2371)

  • An information leak exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in an out-of-bounds read. A malicious user, server, or man- in-the-middle attacker can send an invalid size for a file transfer which will trigger an out-of-bounds read vulnerability. This could result in a denial of service or copy data from memory to the file, resulting in an information leak if the file is sent to another user. (CVE-2016-2372)

  • A denial of service vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in an out-of-bounds read. A malicious server or user can send an invalid mood to trigger this vulnerability. (CVE-2016-2373)

  • An exploitable memory corruption vulnerability exists in the handling of the MXIT protocol in Pidgin.
    Specially crafted MXIT MultiMX message sent via the server can result in an out-of-bounds write leading to memory disclosure and code execution. (CVE-2016-2374)

  • An exploitable out-of-bounds read exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT contact information sent from the server can result in memory disclosure. (CVE-2016-2375)

  • A buffer overflow vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent from the server could potentially result in arbitrary code execution. A malicious server or an attacker who intercepts the network traffic can send an invalid size for a packet which will trigger a buffer overflow. (CVE-2016-2376)

  • A buffer overflow vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent by the server could potentially result in an out-of-bounds write of one byte. A malicious server can send a negative content-length in response to a HTTP request triggering the vulnerability.
    (CVE-2016-2377)

  • A buffer overflow vulnerability exists in the handling of the MXIT protocol Pidgin. Specially crafted data sent via the server could potentially result in a buffer overflow, potentially resulting in memory corruption. A malicious server or an unfiltered malicious user can send negative length values to trigger this vulnerability. (CVE-2016-2378)

  • The Mxit protocol uses weak encryption when encrypting user passwords, which might allow attackers to (1) decrypt hashed passwords by leveraging knowledge of client registration codes or (2) gain login access by eavesdropping on login messages and re-using the hashed passwords. (CVE-2016-2379)

  • An information leak exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent to the server could potentially result in an out-of-bounds read. A user could be convinced to enter a particular string which would then get converted incorrectly and could lead to a potential out-of-bounds read. (CVE-2016-2380)

  • A directory traversal exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent from the server could potentially result in an overwrite of files. A malicious server or someone with access to the network traffic can provide an invalid filename for a splash image triggering the vulnerability. (CVE-2016-4323)

Note that Nessus has not tested for these issues but has instead relied on the package manager’s report that the package is installed.

#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Red Hat Security Advisory pidgin. The text
# itself is copyright (C) Red Hat, Inc.
##

include('compat.inc');

if (description)
{
  script_id(196266);
  script_version("1.0");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/05/11");

  script_cve_id(
    "CVE-2016-2365",
    "CVE-2016-2366",
    "CVE-2016-2367",
    "CVE-2016-2368",
    "CVE-2016-2369",
    "CVE-2016-2370",
    "CVE-2016-2371",
    "CVE-2016-2372",
    "CVE-2016-2373",
    "CVE-2016-2374",
    "CVE-2016-2375",
    "CVE-2016-2376",
    "CVE-2016-2377",
    "CVE-2016-2378",
    "CVE-2016-2379",
    "CVE-2016-2380",
    "CVE-2016-4323",
    "CVE-2017-2640"
  );

  script_name(english:"RHEL 5 : pidgin (Unpatched Vulnerability)");

  script_set_attribute(attribute:"synopsis", value:
"The remote Red Hat 5 host is affected by multiple vulnerabilities that will not be patched.");
  script_set_attribute(attribute:"description", value:
"The remote Redhat Enterprise Linux 5 host has one or more packages installed that are affected by multiple
vulnerabilities that have been acknowledged by the vendor but will not be patched.

  - pidgin: Out-of-bounds write in purple_markup_unescape_entity triggered by invalid XML (CVE-2017-2640)

  - A denial of service vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted
    MXIT data sent via the server could potentially result in a null pointer dereference. A malicious server
    or an attacker who intercepts the network traffic can send invalid data to trigger this vulnerability and
    cause a crash. (CVE-2016-2365)

  - A denial of service vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted
    MXIT data sent via the server could potentially result in an out-of-bounds read. A malicious server or an
    attacker who intercepts the network traffic can send invalid data to trigger this vulnerability and cause
    a crash. (CVE-2016-2366)

  - An information leak exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data
    sent via the server could potentially result in an out-of-bounds read. A malicious user, server, or man-
    in-the-middle can send an invalid size for an avatar which will trigger an out-of-bounds read
    vulnerability. This could result in a denial of service or copy data from memory to the file, resulting in
    an information leak if the avatar is sent to another user. (CVE-2016-2367)

  - Multiple memory corruption vulnerabilities exist in the handling of the MXIT protocol in Pidgin. Specially
    crafted MXIT data sent via the server could result in multiple buffer overflows, potentially resulting in
    code execution or memory disclosure. (CVE-2016-2368)

  - A NULL pointer dereference vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially
    crafted MXIT data sent via the server could potentially result in a denial of service vulnerability. A
    malicious server can send a packet starting with a NULL byte triggering the vulnerability. (CVE-2016-2369)

  - A denial of service vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted
    MXIT data sent from the server could potentially result in an out-of-bounds read. A malicious server or
    man-in-the-middle attacker can send invalid data to trigger this vulnerability. (CVE-2016-2370)

  - An out-of-bounds write vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially
    crafted MXIT data sent via the server could cause memory corruption resulting in code execution.
    (CVE-2016-2371)

  - An information leak exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data
    sent via the server could potentially result in an out-of-bounds read. A malicious user, server, or man-
    in-the-middle attacker can send an invalid size for a file transfer which will trigger an out-of-bounds
    read vulnerability. This could result in a denial of service or copy data from memory to the file,
    resulting in an information leak if the file is sent to another user. (CVE-2016-2372)

  - A denial of service vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted
    MXIT data sent via the server could potentially result in an out-of-bounds read. A malicious server or
    user can send an invalid mood to trigger this vulnerability. (CVE-2016-2373)

  - An exploitable memory corruption vulnerability exists in the handling of the MXIT protocol in Pidgin.
    Specially crafted MXIT MultiMX message sent via the server can result in an out-of-bounds write leading to
    memory disclosure and code execution. (CVE-2016-2374)

  - An exploitable out-of-bounds read exists in the handling of the MXIT protocol in Pidgin. Specially crafted
    MXIT contact information sent from the server can result in memory disclosure. (CVE-2016-2375)

  - A buffer overflow vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted
    MXIT data sent from the server could potentially result in arbitrary code execution. A malicious server or
    an attacker who intercepts the network traffic can send an invalid size for a packet which will trigger a
    buffer overflow. (CVE-2016-2376)

  - A buffer overflow vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted
    MXIT data sent by the server could potentially result in an out-of-bounds write of one byte. A malicious
    server can send a negative content-length in response to a HTTP request triggering the vulnerability.
    (CVE-2016-2377)

  - A buffer overflow vulnerability exists in the handling of the MXIT protocol Pidgin. Specially crafted data
    sent via the server could potentially result in a buffer overflow, potentially resulting in memory
    corruption. A malicious server or an unfiltered malicious user can send negative length values to trigger
    this vulnerability. (CVE-2016-2378)

  - The Mxit protocol uses weak encryption when encrypting user passwords, which might allow attackers to (1)
    decrypt hashed passwords by leveraging knowledge of client registration codes or (2) gain login access by
    eavesdropping on login messages and re-using the hashed passwords. (CVE-2016-2379)

  - An information leak exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data
    sent to the server could potentially result in an out-of-bounds read. A user could be convinced to enter a
    particular string which would then get converted incorrectly and could lead to a potential out-of-bounds
    read. (CVE-2016-2380)

  - A directory traversal exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data
    sent from the server could potentially result in an overwrite of files. A malicious server or someone with
    access to the network traffic can provide an invalid filename for a splash image triggering the
    vulnerability. (CVE-2016-4323)

Note that Nessus has not tested for these issues but has instead relied on the package manager's report that the package
is installed.");
  script_set_attribute(attribute:"solution", value:
"The vendor has acknowledged the vulnerabilities but no solution has been provided. Refer to the vendor for remediation
guidance.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2017-2640");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"vendor_unpatched", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2016/06/21");
  script_set_attribute(attribute:"plugin_publication_date", value:"2024/05/11");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:5");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:6");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:pidgin");
  script_set_attribute(attribute:"generated_plugin", value:"current");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Red Hat Local Security Checks");

  script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("ssh_get_info.nasl", "redhat_repos.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");

  exit(0);
}


include('rpm.inc');
include('rhel.inc');

if (!get_kb_item("global_settings/vendor_unpatched"))
exit(0, "Unpatched Vulnerabilities Detection not active.");

if (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
var os_release = get_kb_item('Host/RedHat/release');
if (isnull(os_release) || 'Red Hat' >!< os_release) audit(AUDIT_OS_NOT, 'Red Hat');
var os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:os_release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Red Hat');
os_ver = os_ver[1];
if (!rhel_check_release(operator: 'ge', os_version: os_ver, rhel_version: '5')) audit(AUDIT_OS_NOT, 'Red Hat 5.x', 'Red Hat ' + os_ver);

if (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);

var cpu = get_kb_item('Host/cpu');
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$" && 's390' >!< cpu && 'aarch64' >!< cpu && 'ppc' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Red Hat', cpu);

var constraints = [
  {
    'pkgs': [
      {'reference':'pidgin', 'release':'5', 'rpm_spec_vers_cmp':TRUE, 'unpatched_pkg':'pidgin'}
    ]
  }
];


var flag = 0;
foreach var constraint_array ( constraints ) {
  var repo_relative_urls = NULL;
  var enterprise_linux_flag = rhel_repo_urls_has_content_dist_rhel(repo_urls:repo_relative_urls);
  foreach var pkg ( constraint_array['pkgs'] ) {
    var unpatched_pkg = NULL;
    var _release = NULL;
    var sp = NULL;
    var el_string = NULL;
    var rpm_spec_vers_cmp = NULL;
    var exists_check = NULL;
    var cves = NULL;
    if (!empty_or_null(pkg['unpatched_pkg'])) unpatched_pkg = pkg['unpatched_pkg'];
    if (!empty_or_null(pkg['release'])) _release = 'RHEL' + pkg['release'];
    if (!empty_or_null(pkg['sp'])) sp = pkg['sp'];
    if (!empty_or_null(pkg['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = pkg['rpm_spec_vers_cmp'];
    if (!empty_or_null(pkg['exists_check'])) exists_check = pkg['exists_check'];
    if (!empty_or_null(pkg['cves'])) cves = pkg['cves'];
    if (unpatched_pkg &&
        _release &&
        (!exists_check || rpm_exists(release:_release, rpm:exists_check)) &&
        unpatched_package_exists(release:_release, package:unpatched_pkg, cves: cves)) flag++;
  }
}

if (flag)
{
  var extra = NULL;
  security_report_v4(
      port       : 0,
      severity   : SECURITY_HOLE,
      extra      : unpatched_packages_report()
  );
  exit(0);
}
else
{
  var tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'pidgin');
}
VendorProductVersionCPE
redhatenterprise_linux5cpe:/o:redhat:enterprise_linux:5
redhatenterprise_linux6cpe:/o:redhat:enterprise_linux:6
redhatenterprise_linux7cpe:/o:redhat:enterprise_linux:7
redhatenterprise_linuxpidginp-cpe:/a:redhat:enterprise_linux:pidgin

References