openSUSE Security Update : pidgin (openSUSE-SU-2014:1376-1)

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Synopsis :

The remote openSUSE host is missing a security update.

Description :

The following issues were fixed in this update :

+ General :

- Check the basic constraints extension when validating
SSL/TLS certificates. This fixes a security hole that
allowed a malicious man-in-the-middle to impersonate an
IM server or any other https endpoint. This affected
both the NSS and GnuTLS plugins (CVE-2014-3694,

- Allow and prefer TLS 1.2 and 1.1 when using the NSS
plugin for SSL (im#15909).

+ libpurple3 compatibility :

- Encrypted account passwords are preserved until the new
one is set.

- Fix loading Google Talk and Facebook XMPP accounts.

+ Groupwise: Fix potential remote crash parsing server
message that indicates that a large amount of memory
should be allocated (CVE-2014-3696, boo#902410).

+ IRC: Fix a possible leak of unencrypted data when using
/me command with OTR (im#15750).

+ MXit: Fix potential remote crash parsing a malformed
emoticon response (CVE-2014-3695, boo#902409).

+ XMPP :

- Fix potential information leak where a malicious XMPP
server and possibly even a malicious remote user could
create a carefully crafted XMPP message that causes
libpurple to send an XMPP message containing arbitrary
memory (CVE-2014-3698, boo#902408).

+ Yahoo: Fix login when using the GnuTLS library for TLS
connections (im#16172, boo#874606).

See also :

Solution :

Update the affected pidgin packages.

Risk factor :

Medium / CVSS Base Score : 6.4

Family: SuSE Local Security Checks

Nessus Plugin ID: 79101 ()

Bugtraq ID:

CVE ID: CVE-2014-3694

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now