openSUSE Security Update : pidgin (openSUSE-SU-2013:0405-1)

This script is Copyright (C) 2014-2017 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

pidgin was updated to fix security issues :

- Fix a crash when receiving UPnP responses with
abnormally long values. (CVE-2013-0274)

- Fix a crash in Sametime when a malicious server sends us
an abnormally long user ID. (CVE-2013-0273)

- Fix a bug where the MXit server or a man-in-the-middle
could potentially send specially crafted data that could
overflow a buffer and lead to a crash or remote code
execution.(CVE-2013-0272)

- Fix a bug where a remote MXit user could possibly
specify a local file path to be written to.
(CVE-2013-0271)

See also :

http://lists.opensuse.org/opensuse-updates/2013-03/msg00016.html
https://bugzilla.novell.com/show_bug.cgi?id=804742

Solution :

Update the affected pidgin packages.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.0
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: SuSE Local Security Checks

Nessus Plugin ID: 74915 ()

Bugtraq ID:

CVE ID: CVE-2013-0271
CVE-2013-0272
CVE-2013-0273
CVE-2013-0274

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now