openSUSE Security Update : pidgin (openSUSE-SU-2014:1376-1)

Medium Nessus Plugin ID 79101


The remote openSUSE host is missing a security update.


The following issues were fixed in this update :

+ General :

- Check the basic constraints extension when validating SSL/TLS certificates. This fixes a security hole that allowed a malicious man-in-the-middle to impersonate an IM server or any other https endpoint. This affected both the NSS and GnuTLS plugins (CVE-2014-3694, boo#902495).

- Allow and prefer TLS 1.2 and 1.1 when using the NSS plugin for SSL (im#15909).

+ libpurple3 compatibility :

- Encrypted account passwords are preserved until the new one is set.

- Fix loading Google Talk and Facebook XMPP accounts.

+ Groupwise: Fix potential remote crash parsing server message that indicates that a large amount of memory should be allocated (CVE-2014-3696, boo#902410).

+ IRC: Fix a possible leak of unencrypted data when using /me command with OTR (im#15750).

+ MXit: Fix potential remote crash parsing a malformed emoticon response (CVE-2014-3695, boo#902409).

+ XMPP :

- Fix potential information leak where a malicious XMPP server and possibly even a malicious remote user could create a carefully crafted XMPP message that causes libpurple to send an XMPP message containing arbitrary memory (CVE-2014-3698, boo#902408).

+ Yahoo: Fix login when using the GnuTLS library for TLS connections (im#16172, boo#874606).


Update the affected pidgin packages.

See Also

Plugin Details

Severity: Medium

ID: 79101

File Name: openSUSE-2014-635.nasl

Version: $Revision: 1.2 $

Type: local

Agent: unix

Published: 2014/11/11

Modified: 2014/11/17

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:finch, p-cpe:/a:novell:opensuse:finch-debuginfo, p-cpe:/a:novell:opensuse:finch-devel, p-cpe:/a:novell:opensuse:libpurple, p-cpe:/a:novell:opensuse:libpurple-branding-openSUSE, p-cpe:/a:novell:opensuse:libpurple-branding-upstream, p-cpe:/a:novell:opensuse:libpurple-debuginfo, p-cpe:/a:novell:opensuse:libpurple-devel, p-cpe:/a:novell:opensuse:libpurple-lang, p-cpe:/a:novell:opensuse:libpurple-meanwhile, p-cpe:/a:novell:opensuse:libpurple-meanwhile-debuginfo, p-cpe:/a:novell:opensuse:libpurple-tcl, p-cpe:/a:novell:opensuse:libpurple-tcl-debuginfo, p-cpe:/a:novell:opensuse:pidgin, p-cpe:/a:novell:opensuse:pidgin-debuginfo, p-cpe:/a:novell:opensuse:pidgin-debugsource, p-cpe:/a:novell:opensuse:pidgin-devel, p-cpe:/a:novell:opensuse:pidgin-otr, p-cpe:/a:novell:opensuse:pidgin-otr-debuginfo, p-cpe:/a:novell:opensuse:pidgin-otr-debugsource, cpe:/o:novell:opensuse:12.3, cpe:/o:novell:opensuse:13.1

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 2014/10/31

Reference Information

CVE: CVE-2014-3694, CVE-2014-3695, CVE-2014-3696, CVE-2014-3697, CVE-2014-3698