GLSA-200901-13 : Pidgin: Multiple vulnerabilities

This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.

Synopsis :

The remote Gentoo host is missing one or more security-related

Description :

The remote host is affected by the vulnerability described in GLSA-200901-13
(Pidgin: Multiple vulnerabilities)

Multiple vulnerabilities have been discovered in Pidgin and the
libpurple library:
A participant to the TippingPoint ZDI reported multiple integer
overflows in the msn_slplink_process_msg() function in the MSN protocol
implementation (CVE-2008-2927).
Juan Pablo Lopez Yacubian is credited for reporting a use-after-free
flaw in msn_slplink_process_msg() in the MSN protocol implementation
The included UPnP server does not limit the size of data to be
downloaded for UPnP service discovery, according to a report by Andrew
Hunt and Christian Grothoff (CVE-2008-2957).
Josh Triplett discovered that the NSS plugin for libpurple does not
properly verify SSL certificates (CVE-2008-3532).

Impact :

A remote attacker could send specially crafted messages or files using
the MSN protocol which could result in the execution of arbitrary code
or crash Pidgin. NOTE: Successful exploitation might require the
victim's interaction. Furthermore, an attacker could conduct
man-in-the-middle attacks to obtain sensitive information using bad
certificates and cause memory and disk resources to exhaust.

Workaround :

There is no known workaround at this time.

See also :

Solution :

All Pidgin users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=net-im/pidgin-2.5.1'

Risk factor :

Medium / CVSS Base Score : 6.8

Family: Gentoo Local Security Checks

Nessus Plugin ID: 35432 (gentoo_GLSA-200901-13.nasl)

Bugtraq ID:

CVE ID: CVE-2008-2927

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now