GLSA-200901-13 : Pidgin: Multiple vulnerabilities

This script is Copyright (C) 2009-2014 Tenable Network Security, Inc.


Synopsis :

The remote Gentoo host is missing one or more security-related
patches.

Description :

The remote host is affected by the vulnerability described in GLSA-200901-13
(Pidgin: Multiple vulnerabilities)

Multiple vulnerabilities have been discovered in Pidgin and the
libpurple library:
A participant to the TippingPoint ZDI reported multiple integer
overflows in the msn_slplink_process_msg() function in the MSN protocol
implementation (CVE-2008-2927).
Juan Pablo Lopez Yacubian is credited for reporting a use-after-free
flaw in msn_slplink_process_msg() in the MSN protocol implementation
(CVE-2008-2955).
The included UPnP server does not limit the size of data to be
downloaded for UPnP service discovery, according to a report by Andrew
Hunt and Christian Grothoff (CVE-2008-2957).
Josh Triplett discovered that the NSS plugin for libpurple does not
properly verify SSL certificates (CVE-2008-3532).

Impact :

A remote attacker could send specially crafted messages or files using
the MSN protocol which could result in the execution of arbitrary code
or crash Pidgin. NOTE: Successful exploitation might require the
victim's interaction. Furthermore, an attacker could conduct
man-in-the-middle attacks to obtain sensitive information using bad
certificates and cause memory and disk resources to exhaust.

Workaround :

There is no known workaround at this time.

See also :

http://www.gentoo.org/security/en/glsa/glsa-200901-13.xml

Solution :

All Pidgin users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=net-im/pidgin-2.5.1'

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

Family: Gentoo Local Security Checks

Nessus Plugin ID: 35432 (gentoo_GLSA-200901-13.nasl)

Bugtraq ID:

CVE ID: CVE-2008-2927
CVE-2008-2955
CVE-2008-2957
CVE-2008-3532