SuSE 11.3 Security Update : finch (SAT Patch Number 9213)

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Synopsis :

The remote SuSE 11 host is missing one or more security updates.

Description :

The pidgin Instant Messenger has been updated to fix various security
issues :

- Remotely triggerable crash in IRC argument parsing.

- Buffer overflow in SIMPLE header parsing.

- Buffer overflow in MXit emoticon parsing.

- Buffer overflow in Gadu-Gadu HTTP parsing.

- Pidgin uses clickable links to untrusted executables.

- Buffer overflow parsing chunked HTTP responses.

- Crash reading response from STUN server. (CVE-2013-6484)

- XMPP doesn't verify 'from' on some iq replies.

- NULL pointer dereference parsing SOAP data in MSN.

- NULL pointer dereference parsing OIM data in MSN.

- NULL pointer dereference parsing headers in MSN.

- Remote crash reading Yahoo! P2P message. (CVE-2013-6481)

- Remote crash parsing HTTP responses. (CVE-2013-6479)

- Crash when hovering pointer over a long URL.

- Crash handling bad XMPP timestamp. (CVE-2013-6477)

- Yahoo! remote crash from incorrect character encoding.

See also :

Solution :

Apply SAT patch number 9213.

Risk factor :

Critical / CVSS Base Score : 10.0

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now