Pidgin < 2.5.6 Multiple Buffer Overflow Vulnerabilities

high Nessus Network Monitor Plugin ID 5032

Synopsis

The remote host is affected by multiple remote buffer overflow vulnerabilities.

Description

The remote host is running Pidgin earlier than 2.5.6. Such versions are reportedly affected by multiple remote buffer overflow vulnerabilities :

- A buffer overflow issue in the 'decrypt_out()' function can be exploited through specially crafted 'QQ' packets. (CVE-2009-1374)

- A buffer maintained by PurpleCircBuffer which is used by XMPP and Sametime protocol plugins can be corrupted if it's exactly full and then more bytes are added to it. (CVE-2009-1375)

- A buffer overflow is possible when initiating a file transfer to a malicious buddy over XMPP. (CVE-2009-1373)

- An integer-overflow issue exists in the application due to a n incorrect typecasting of 'int64' to 'size_t'. (CVE-2009-1376)

Successful exploitation could allow an attacker to execute arbitrary code on the remote host.

Solution

Upgrade to Pidgin 2.5.6 or later.

See Also

http://www.pidgin.im/news/security/?id=32

Plugin Details

Severity: High

ID: 5032

Published: 8/18/2004

Updated: 3/6/2019

Nessus ID: 38866

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: High

Base Score: 7.3

Temporal Score: 6.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:pidgin:pidgin

Reference Information

CVE: CVE-2009-1373, CVE-2009-1374, CVE-2009-1375, CVE-2009-1376

BID: 35067