Pidgin < 2.10.2 Multiple DoS

medium Nessus Plugin ID 58410

Synopsis

An instant messaging client installed on the remote Windows host is potentially affected by multiple denial of service vulnerabilities.

Description

The version of Pidgin installed on the remote host is earlier than 2.10.2 and is potentially affected by the following issues :

- A denial of service vulnerability (NULL pointer dereference) in the 'pidgin_conv_chat_rename_user' function in 'gtkconv.c'. Remote attackers can trigger the vulnerability by performing certain types of nickname changes while in an XMPP chat room. (CVE-2011-4939)

- The msn_oim_report_to_user function in oim.c allows remote servers to cause an application crash by sending an OIM message without UTF-8 encoding. (CVE-2012-1178)

Solution

Upgrade to Pidgin 2.10.2 or later.

See Also

https://developer.pidgin.im/ticket/14392

http://pidgin.im/news/security/?id=60

http://pidgin.im/news/security/?id=61

https://developer.pidgin.im/ticket/14884

Plugin Details

Severity: Medium

ID: 58410

File Name: pidgin_2_10_2.nasl

Version: 1.5

Type: local

Agent: windows

Family: Windows

Published: 3/21/2012

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: Medium

Base Score: 6.4

Temporal Score: 4.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:P

Vulnerability Information

CPE: cpe:/a:pidgin:pidgin

Required KB Items: SMB/Pidgin/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 4/14/2012

Vulnerability Publication Date: 7/8/2011

Reference Information

CVE: CVE-2011-4939, CVE-2012-1178

BID: 52475, 52476