Pidgin < 2.10.0 Multiple Vulnerabilities

This script is Copyright (C) 2011 Tenable Network Security, Inc.


Synopsis :

An instant messaging client installed on the remote Windows host
has multiple vulnerabilities.

Description :

The version of Pidgin installed on the remote host is earlier than
2.10.0. As such, it is potentially affected by the following issues :

- A code execution vulnerability caused by clicking on a
file:// URI received in an IM that Pidgin will attempt
to execute. This can result in the execution of
attacker-controlled code if the file is located on a
network share. (CVE-2011-3185)

- A denial of service in the IRC protocol plugin caused
by processing a specially crafted nickname when listing
the set of users. (CVE-2011-2943)

- A denial of service in the MSN protocol plugin caused
by incorrect handling of HTTP 100 responses. This only
affects users who have enabled the HTTP connection
method, which is disabled by default. (CVE-2011-3184)

See also :

http://www.insomniasec.com/advisories/ISVA-110822.1.htm
http://www.securityfocus.com/archive/1/519391/30/0/threaded
http://pidgin.im/news/security/?id=53
http://pidgin.im/news/security/?id=54
http://pidgin.im/news/security/?id=55

Solution :

Upgrade to Pidgin 2.10.0 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.7
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 55928 ()

Bugtraq ID: 49268

CVE ID: CVE-2011-2943
CVE-2011-3184
CVE-2011-3185

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now