SuSE 11.1 Security Update : finch, libpurple and pidgin (SAT Patch Number 6294)

medium Nessus Plugin ID 64128

Synopsis

The remote SuSE 11 host is missing one or more security updates.

Description

Various remote triggerable crashes in pidgin have been fixed :

- In some situations the MSN server sends text that isn't UTF-8 encoded, and Pidgin fails to verify the text's encoding. In some cases this can lead to a crash when attempting to display the text (). (CVE-2012-1178)

- Incoming messages with certain characters or character encodings can cause clients to crash. (CVE-2012-1178 / CVE-2012-2318)

- A series of specially crafted file transfer requests can cause clients to reference invalid memory. The user must have accepted one of the file transfer requests.
(CVE-2012-2214)

Solution

Apply SAT patch number 6294.

See Also

http://support.novell.com/security/cve/CVE-2012-1178.html

http://support.novell.com/security/cve/CVE-2012-2214.html

http://support.novell.com/security/cve/CVE-2012-2318.html

https://bugzilla.novell.com/show_bug.cgi?id=752275

https://bugzilla.novell.com/show_bug.cgi?id=760890

https://bugzilla.novell.com/show_bug.cgi?id=761155

Plugin Details

Severity: Medium

ID: 64128

File Name: suse_11_finch-120515.nasl

Version: 1.4

Type: local

Agent: unix

Published: 1/25/2013

Updated: 1/19/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:11:finch, p-cpe:/a:novell:suse_linux:11:libpurple, p-cpe:/a:novell:suse_linux:11:libpurple-lang, p-cpe:/a:novell:suse_linux:11:libpurple-meanwhile, p-cpe:/a:novell:suse_linux:11:libpurple-tcl, p-cpe:/a:novell:suse_linux:11:pidgin, cpe:/o:novell:suse_linux:11

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 5/15/2012

Reference Information

CVE: CVE-2012-1178, CVE-2012-2214, CVE-2012-2318