Pidgin < 2.10.0 Multiple Vulnerabilities

high Nessus Plugin ID 55928

Synopsis

An instant messaging client installed on the remote Windows host has multiple vulnerabilities.

Description

The version of Pidgin installed on the remote host is earlier than 2.10.0. As such, it is potentially affected by the following issues :

- A code execution vulnerability caused by clicking on a file:// URI received in an IM that Pidgin will attempt to execute. This can result in the execution of attacker-controlled code if the file is located on a network share. (CVE-2011-3185)

- A denial of service in the IRC protocol plugin caused by processing a specially crafted nickname when listing the set of users. (CVE-2011-2943)

- A denial of service in the MSN protocol plugin caused by incorrect handling of HTTP 100 responses. This only affects users who have enabled the HTTP connection method, which is disabled by default. (CVE-2011-3184)

Solution

Upgrade to Pidgin 2.10.0 or later.

See Also

https://www.insomniasec.com/home

https://www.securityfocus.com/archive/1/519391/30/0/threaded

http://pidgin.im/news/security/?id=53

http://pidgin.im/news/security/?id=54

http://pidgin.im/news/security/?id=55

Plugin Details

Severity: High

ID: 55928

File Name: pidgin_2_10_0.nasl

Version: 1.7

Type: local

Agent: windows

Family: Windows

Published: 8/22/2011

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:pidgin:pidgin

Required KB Items: SMB/Pidgin/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 8/20/2011

Vulnerability Publication Date: 8/20/2011

Reference Information

CVE: CVE-2011-2943, CVE-2011-3184, CVE-2011-3185

BID: 49268