Pidgin < 2.10.7 Multiple Vulnerabilities
Medium Nessus Plugin ID 64670
SynopsisAn instant messaging client installed on the remote Windows host is affected by multiple vulnerabilities.
DescriptionThe version of Pidgin installed on the remote host is earlier than 2.10.7. It is, therefore, potentially affected by the following vulnerabilities :
- An error exists related to the 'MXit' plugin and the saving of images that could allow arbitrary files to be overwritten. (CVE-2013-0271)
- A stack-based buffer overflow exists in the function 'mxit_cb_http_read' in the file 'libpurple/protocols/mxit/http.c' that could allow arbitrary code execution when handling certain HTTP headers. (CVE-2013-0272)
- An error exists in the function 'mw_prpl_normalize' in the file 'libpurple/protocols/sametime/sametime.c' that could allow denial of service attacks when handling user IDs longer than 4096 bytes. (CVE-2013-0273)
- Errors exist in the functions 'upnp_parse_description_cb', 'purple_upnp_discover_send_broadcast', 'looked_up_public_ip_cb', 'looked_up_internal_ip_cb', 'purple_upnp_set_port_mapping', and 'purple_upnp_remove_port_mapping' in the file 'libpurple/upnp.c' that could allow denial of service attacks when handling certain UPnP response messages.
SolutionUpgrade to Pidgin 2.10.7 or later.