openSUSE Security Update : pidgin (openSUSE-SU-2014:1397-1)

Medium Nessus Plugin ID 79223


The remote openSUSE host is missing a security update.


- Update to version 2.10.10 :

+ General :

- Check the basic constraints extension when validating SSL/TLS certificates. This fixes a security hole that allowed a malicious man-in-the-middle to impersonate an IM server or any other https endpoint. This affected both the NSS and GnuTLS plugins (CVE-2014-3694, boo#902495).

- Allow and prefer TLS 1.2 and 1.1 when using the NSS plugin for SSL (im#15909).

+ libpurple3 compatibility :

- Encrypted account passwords are preserved until the new one is set.

- Fix loading Google Talk and Facebook XMPP accounts.

+ Windows-Specific Changes: Don't allow overwriting arbitrary files on the file system when the user installs a smiley theme via drag-and-drop (CVE-2014-3697).

+ Finch: Fix build against Python 3 (im#15969).

+ Gadu-Gadu: Updated internal libgadu to version 1.12.0.

+ Groupwise: Fix potential remote crash parsing server message that indicates that a large amount of memory should be allocated (CVE-2014-3696, boo#902410).

+ IRC: Fix a possible leak of unencrypted data when using /me command with OTR (im#15750).

+ MXit: Fix potential remote crash parsing a malformed emoticon response (CVE-2014-3695, boo#902409).

+ XMPP :

- Fix potential information leak where a malicious XMPP server and possibly even a malicious remote user could create a carefully crafted XMPP message that causes libpurple to send an XMPP message containing arbitrary memory (CVE-2014-3698, boo#902408).

- Fix Facebook XMPP roster quirks (im#15041, im#15957).

+ Yahoo: Fix login when using the GnuTLS library for TLS connections (im#16172, boo#874606).

- Drop pidgin-gstreamer1.patch: causes crashes and Video still does not work (boo#853038). Drop BuildRequires conditions switching to GStreamer 1.0.

- Rebase pidgin-crash-missing-gst-registry.patch.

+ add pidgin-crash-missing-gst-registry.patch according to the GST doc, 'gst_init' should be called before any other calls.


Update the affected pidgin packages.

See Also

Plugin Details

Severity: Medium

ID: 79223

File Name: openSUSE-2014-648.nasl

Version: $Revision: 1.1 $

Type: local

Agent: unix

Published: 2014/11/13

Modified: 2014/11/13

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:finch, p-cpe:/a:novell:opensuse:finch-debuginfo, p-cpe:/a:novell:opensuse:finch-devel, p-cpe:/a:novell:opensuse:libpurple, p-cpe:/a:novell:opensuse:libpurple-branding-openSUSE, p-cpe:/a:novell:opensuse:libpurple-branding-upstream, p-cpe:/a:novell:opensuse:libpurple-debuginfo, p-cpe:/a:novell:opensuse:libpurple-devel, p-cpe:/a:novell:opensuse:libpurple-lang, p-cpe:/a:novell:opensuse:libpurple-meanwhile, p-cpe:/a:novell:opensuse:libpurple-meanwhile-debuginfo, p-cpe:/a:novell:opensuse:libpurple-tcl, p-cpe:/a:novell:opensuse:libpurple-tcl-debuginfo, p-cpe:/a:novell:opensuse:pidgin, p-cpe:/a:novell:opensuse:pidgin-debuginfo, p-cpe:/a:novell:opensuse:pidgin-debugsource, p-cpe:/a:novell:opensuse:pidgin-devel, cpe:/o:novell:opensuse:13.2

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 2014/11/04

Reference Information

CVE: CVE-2014-3694, CVE-2014-3695, CVE-2014-3696, CVE-2014-3697, CVE-2014-3698