Ubuntu 10.04 LTS / 11.10 / 12.04 LTS / 12.10 : pidgin vulnerabilities (USN-1746-1)

Ubuntu Security Notice (C) 2013-2014 Canonical, Inc. / NASL script (C) 2013-2014 Tenable Network Security, Inc.


Synopsis :

The remote Ubuntu host is missing one or more security-related patches.

Description :

Chris Wysopal discovered that Pidgin incorrectly handled file
transfers in the MXit protocol handler. A remote attacker could use
this issue to create or overwrite arbitrary files. This issue only
affected Ubuntu 11.10, Ubuntu 12.04 LTS and Ubuntu 12.10.
(CVE-2013-0271)

It was discovered that Pidgin incorrectly handled long HTTP headers in
the MXit protocol handler. A malicious remote server could use this
issue to execute arbitrary code. (CVE-2013-0272)

It was discovered that Pidgin incorrectly handled long user IDs in the
Sametime protocol handler. A malicious remote server could use this
issue to cause Pidgin to crash, resulting in a denial of service.
(CVE-2013-0273)

It was discovered that Pidgin incorrectly handled long strings when
processing UPnP responses. A remote attacker could use this issue to
cause Pidgin to crash, resulting in a denial of service.
(CVE-2013-0274).

Solution :

Update the affected libpurple0 and / or pidgin packages.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.9
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 64890 ()

Bugtraq ID: 57951
57952
57954

CVE ID: CVE-2013-0271
CVE-2013-0272
CVE-2013-0273
CVE-2013-0274