SuSE 11.3 Security Update : finch (SAT Patch Number 9213)

This script is Copyright (C) 2014 Tenable Network Security, Inc.


Synopsis :

The remote SuSE 11 host is missing one or more security updates.

Description :

The pidgin Instant Messenger has been updated to fix various security
issues :

- Remotely triggerable crash in IRC argument parsing.
(CVE-2014-0020)

- Buffer overflow in SIMPLE header parsing.
(CVE-2013-6490)

- Buffer overflow in MXit emoticon parsing.
(CVE-2013-6489)

- Buffer overflow in Gadu-Gadu HTTP parsing.
(CVE-2013-6487)

- Pidgin uses clickable links to untrusted executables.
(CVE-2013-6486)

- Buffer overflow parsing chunked HTTP responses.
(CVE-2013-6485)

- Crash reading response from STUN server. (CVE-2013-6484)

- XMPP doesn't verify 'from' on some iq replies.
(CVE-2013-6483)

- NULL pointer dereference parsing SOAP data in MSN.
(CVE-2013-6482)

- NULL pointer dereference parsing OIM data in MSN.
(CVE-2013-6482)

- NULL pointer dereference parsing headers in MSN.
(CVE-2013-6482)

- Remote crash reading Yahoo! P2P message. (CVE-2013-6481)

- Remote crash parsing HTTP responses. (CVE-2013-6479)

- Crash when hovering pointer over a long URL.
(CVE-2013-6478)

- Crash handling bad XMPP timestamp. (CVE-2013-6477)

- Yahoo! remote crash from incorrect character encoding.
(CVE-2012-6152)

See also :

https://bugzilla.novell.com/show_bug.cgi?id=861019
http://support.novell.com/security/cve/CVE-2012-6152.html
http://support.novell.com/security/cve/CVE-2013-6477.html
http://support.novell.com/security/cve/CVE-2013-6478.html
http://support.novell.com/security/cve/CVE-2013-6479.html
http://support.novell.com/security/cve/CVE-2013-6481.html
http://support.novell.com/security/cve/CVE-2013-6482.html
http://support.novell.com/security/cve/CVE-2013-6483.html
http://support.novell.com/security/cve/CVE-2013-6484.html
http://support.novell.com/security/cve/CVE-2013-6485.html
http://support.novell.com/security/cve/CVE-2013-6486.html
http://support.novell.com/security/cve/CVE-2013-6487.html
http://support.novell.com/security/cve/CVE-2013-6489.html
http://support.novell.com/security/cve/CVE-2013-6490.html
http://support.novell.com/security/cve/CVE-2014-0020.html

Solution :

Apply SAT patch number 9213.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now