Pidgin < 2.12.0 libpurple/util.c purple_markup_unescape_entity() XML Entity Handling RCE

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

An instant messaging client installed on the remote host is affected
by a remote code execution vulnerability.

Description :

The version of Pidgin installed on the remote Windows host is prior to
2.12.0. It is, therefore, affected by a remote code execution
vulnerability in the libpurple library in util.c due to an
out-of-bounds writer error in the purple_markup_unescape_entity()
function that is triggered when handling invalid XML entities
separated by whitespaces. An unauthenticated, remote attacker can
exploit this, via a malicious server, to execute arbitrary code.

See also :

https://pidgin.im/news/security/?id=109

Solution :

Upgrade to Pidgin version 2.12.0 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.9
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 97947 ()

Bugtraq ID: 96775

CVE ID: CVE-2017-2640

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now