SuSE 10 Security Update : pidgin, gaim and finch (ZYPP Patch Number 5573)

Medium Nessus Plugin ID 51722


The remote SuSE 10 host is missing a security-related patch.


- specially crafted MSN SLP messages could cause an integer overflow in pidgin. Attackers could potentially exploit that to execute arbitrary code. (CVE-2008-2927)

- overly long file names in MSN file transfers could crash pidgin. (CVE-2008-2955)

- SSL certifcates were not verfied. Therefore piding didn't notice faked certificates. (CVE-2008-3532)

Additionally a problem was fixed that prevented gaim clients from connecting to the ICQ network after a server change on July 1st 2008.


Apply ZYPP patch number 5573.

See Also

Plugin Details

Severity: Medium

ID: 51722

File Name: suse_finch-5573.nasl

Version: $Revision: 1.4 $

Type: local

Agent: unix

Published: 2011/01/27

Modified: 2016/12/22

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/o:suse:suse_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 2008/09/03

Reference Information

CVE: CVE-2008-2927, CVE-2008-2955, CVE-2008-3532

CWE: 20, 189, 310