SuSE 11 Security Update : pidgin (SAT Patch Number 2019)

This script is Copyright (C) 2010-2016 Tenable Network Security, Inc.


Synopsis :

The remote SuSE 11 host is missing one or more security updates.

Description :

This update of pidgin fixes various security vulnerabilities :

- Remote file disclosure vulnerability by using the MSN
protocol. (CVE-2010-0013: CVSS v2 Base Score: 4.3 : Path
Traversal (CWE-22))

- MSN protocol plugin in libpurple allowed remote
attackers to cause a denial of service (memory
corruption) at least. (CVE-2010-0277: CVSS v2 Base
Score: 4.9 : Resource Management Errors (CWE-399))

- Same nick names in XMPP MUC lead to a crash in finch.
(CVE-2010-0420)

- A remote denial of service attack (resource consumption)
is possible by sending an IM with a lot of smilies in
it. (CVE-2010-0423)

See also :

https://bugzilla.novell.com/show_bug.cgi?id=567799
https://bugzilla.novell.com/show_bug.cgi?id=569616
http://support.novell.com/security/cve/CVE-2010-0013.html
http://support.novell.com/security/cve/CVE-2010-0277.html
http://support.novell.com/security/cve/CVE-2010-0420.html
http://support.novell.com/security/cve/CVE-2010-0423.html

Solution :

Apply SAT patch number 2019.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)

Family: SuSE Local Security Checks

Nessus Plugin ID: 44965 ()

Bugtraq ID:

CVE ID: CVE-2010-0013
CVE-2010-0277
CVE-2010-0420
CVE-2010-0423

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now