openSUSE Security Update : pidgin (openSUSE-SU-2014:1376-1)

medium Nessus Plugin ID 79101

Synopsis

The remote openSUSE host is missing a security update.

Description

The following issues were fixed in this update :

+ General :

- Check the basic constraints extension when validating SSL/TLS certificates. This fixes a security hole that allowed a malicious man-in-the-middle to impersonate an IM server or any other https endpoint. This affected both the NSS and GnuTLS plugins (CVE-2014-3694, boo#902495).

- Allow and prefer TLS 1.2 and 1.1 when using the NSS plugin for SSL (im#15909).

+ libpurple3 compatibility :

- Encrypted account passwords are preserved until the new one is set.

- Fix loading Google Talk and Facebook XMPP accounts.

+ Groupwise: Fix potential remote crash parsing server message that indicates that a large amount of memory should be allocated (CVE-2014-3696, boo#902410).

+ IRC: Fix a possible leak of unencrypted data when using /me command with OTR (im#15750).

+ MXit: Fix potential remote crash parsing a malformed emoticon response (CVE-2014-3695, boo#902409).

+ XMPP :

- Fix potential information leak where a malicious XMPP server and possibly even a malicious remote user could create a carefully crafted XMPP message that causes libpurple to send an XMPP message containing arbitrary memory (CVE-2014-3698, boo#902408).

+ Yahoo: Fix login when using the GnuTLS library for TLS connections (im#16172, boo#874606).

Solution

Update the affected pidgin packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=853038

https://bugzilla.opensuse.org/show_bug.cgi?id=874606

https://bugzilla.opensuse.org/show_bug.cgi?id=902408

https://bugzilla.opensuse.org/show_bug.cgi?id=902409

https://bugzilla.opensuse.org/show_bug.cgi?id=902410

https://bugzilla.opensuse.org/show_bug.cgi?id=902495

https://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html

Plugin Details

Severity: Medium

ID: 79101

File Name: openSUSE-2014-635.nasl

Version: 1.5

Type: local

Agent: unix

Published: 11/11/2014

Updated: 1/19/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.0

CVSS v2

Risk Factor: Medium

Base Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:finch, p-cpe:/a:novell:opensuse:finch-debuginfo, p-cpe:/a:novell:opensuse:finch-devel, p-cpe:/a:novell:opensuse:libpurple, p-cpe:/a:novell:opensuse:libpurple-branding-opensuse, p-cpe:/a:novell:opensuse:libpurple-branding-upstream, p-cpe:/a:novell:opensuse:libpurple-debuginfo, p-cpe:/a:novell:opensuse:libpurple-devel, p-cpe:/a:novell:opensuse:libpurple-lang, p-cpe:/a:novell:opensuse:libpurple-meanwhile, p-cpe:/a:novell:opensuse:libpurple-meanwhile-debuginfo, p-cpe:/a:novell:opensuse:libpurple-tcl, p-cpe:/a:novell:opensuse:libpurple-tcl-debuginfo, p-cpe:/a:novell:opensuse:pidgin, p-cpe:/a:novell:opensuse:pidgin-debuginfo, p-cpe:/a:novell:opensuse:pidgin-debugsource, p-cpe:/a:novell:opensuse:pidgin-devel, p-cpe:/a:novell:opensuse:pidgin-otr, p-cpe:/a:novell:opensuse:pidgin-otr-debuginfo, p-cpe:/a:novell:opensuse:pidgin-otr-debugsource, cpe:/o:novell:opensuse:12.3, cpe:/o:novell:opensuse:13.1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 10/31/2014

Reference Information

CVE: CVE-2014-3694, CVE-2014-3695, CVE-2014-3696, CVE-2014-3697, CVE-2014-3698