Pidgin MSN Custom Smileys Feature Emoticon Request Traversal Arbitrary File Disclosure

Medium Nessus Plugin ID 43862

Synopsis

An instant messaging client installed on the remote Windows host is affected by a directory traversal vulnerability.

Description

The version of Pidgin installed on the remote host is earlier than 2.6.5. Such versions have a directory traversal vulnerability when processing an MSN emoticon request. A remote attacker could exploit this to read arbitrary files.

Solution

Upgrade to Pidgin 2.6.5 or later.

See Also

https://events.ccc.de/congress/2009/Fahrplan/events/3596.en.html

http://www.pidgin.im/news/security/?id=42

Plugin Details

Severity: Medium

ID: 43862

File Name: pidgin_2_6_5.nasl

Version: 1.8

Type: local

Agent: windows

Family: Windows

Published: 2010/01/12

Updated: 2018/11/15

Dependencies: 34205

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 4.3

Temporal Score: 3.4

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:pidgin:pidgin

Required KB Items: SMB/Pidgin/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2010/01/08

Vulnerability Publication Date: 2009/12/27

Reference Information

CVE: CVE-2010-0013

BID: 37524

Secunia: 37953

CWE: 22