openSUSE Security Update : finch (finch-2032)

Medium Nessus Plugin ID 44979

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 4.5

Synopsis

The remote openSUSE host is missing a security update.

Description

This update of pidgin fixes various security vulnerabilities

- CVE-2010-0013: CVSS v2 Base Score: 4.3: Path Traversal (CWE-22) Remote file disclosure vulnerability by using the MSN protocol.

- CVE-2010-0277: CVSS v2 Base Score: 4.9: Resource Management Errors (CWE-399) MSN protocol plugin in libpurple allowed remote attackers to cause a denial of service (memory corruption) at least.

- CVE-2010-0420 Same nick names in XMPP MUC lead to a crash in finch.

- CVE-2010-0423 A remote denial of service attack (resource consumption) is possible by sending an IM with a lot of smilies in it.

Solution

Update the affected finch packages.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=567799

https://bugzilla.novell.com/show_bug.cgi?id=569616

Plugin Details

Severity: Medium

ID: 44979

File Name: suse_11_1_finch-100219.nasl

Version: 1.9

Type: local

Agent: unix

Published: 2010/03/04

Updated: 2021/01/14

Dependencies: 12634

Risk Information

Risk Factor: Medium

VPR Score: 4.5

CVSS v2.0

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:finch, p-cpe:/a:novell:opensuse:finch-devel, p-cpe:/a:novell:opensuse:libpurple, p-cpe:/a:novell:opensuse:libpurple-devel, p-cpe:/a:novell:opensuse:libpurple-lang, p-cpe:/a:novell:opensuse:libpurple-meanwhile, p-cpe:/a:novell:opensuse:libpurple-mono, p-cpe:/a:novell:opensuse:pidgin, p-cpe:/a:novell:opensuse:pidgin-devel, cpe:/o:novell:opensuse:11.1

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 2010/02/19

Reference Information

CVE: CVE-2010-0013, CVE-2010-0277, CVE-2010-0420, CVE-2010-0423

CWE: 20, 22, 399