Pidgin MSN Custom Smileys Feature Emoticon Request Traversal Arbitrary File Disclosure

medium Nessus Plugin ID 43862

Language:

Synopsis

An instant messaging client installed on the remote Windows host is affected by a directory traversal vulnerability.

Description

The version of Pidgin installed on the remote host is earlier than 2.6.5. Such versions have a directory traversal vulnerability when processing an MSN emoticon request. A remote attacker could exploit this to read arbitrary files.

Solution

Upgrade to Pidgin 2.6.5 or later.

See Also

https://events.ccc.de/congress/2009/Fahrplan/events/3596.en.html

http://www.pidgin.im/news/security/?id=42

Plugin Details

Severity: Medium

ID: 43862

File Name: pidgin_2_6_5.nasl

Version: 1.8

Type: local

Agent: windows

Family: Windows

Published: 1/12/2010

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.4

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: cpe:/a:pidgin:pidgin

Required KB Items: SMB/Pidgin/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/8/2010

Vulnerability Publication Date: 12/27/2009

Reference Information

CVE: CVE-2010-0013

BID: 37524

CWE: 22

Secunia: 37953