Paketname
pidgin
Datum
2014-02-11
Advisory ID
MDVSA-2014:025
Betroffene Versionen
MES5 i586 , MES5 x86_64

Problembeschreibung

Multiple vulnerabilities has been discovered and corrected in pidgin:

The Yahoo! protocol plugin in libpurple in Pidgin before 2.10.8 does
not properly validate UTF-8 data, which allows remote attackers
to cause a denial of service (application crash) via crafted byte
sequences (CVE-2012-6152).

Multiple integer signedness errors in libpurple in Pidgin before 2.10.8
allow remote attackers to cause a denial of service (application crash)
via a crafted timestamp value in an XMPP message (CVE-2013-6477).

gtkimhtml.c in Pidgin before 2.10.8 does not properly interact
with underlying library support for wide Pango layouts, which
allows user-assisted remote attackers to cause a denial of service
(application crash) via a long URL that is examined with a tooltip
(CVE-2013-6478).

util.c in libpurple in Pidgin before 2.10.8 does not properly allocate
memory for HTTP responses that are inconsistent with the Content-Length
header, which allows remote HTTP servers to cause a denial of service
(application crash) via a crafted response (CVE-2013-6479).

libpurple/protocols/yahoo/libymsg.c in Pidgin before 2.10.8 allows
remote attackers to cause a denial of service (crash) via a Yahoo! P2P
message with a crafted length field, which triggers a buffer over-read
(CVE-2013-6481).

Pidgin before 2.10.8 allows remote MSN servers to cause a denial
of service (NULL pointer dereference and crash) via a crafted (1)
SOAP response, (2) OIM XML response, or (3) Content-Length header
(CVE-2013-6482).

The XMPP protocol plugin in libpurple in Pidgin before 2.10.8 does
not properly determine whether the from address in an iq reply
is consistent with the to address in an iq request, which allows
remote attackers to spoof iq traffic or cause a denial of service
(NULL pointer dereference and application crash) via a crafted reply
(CVE-2013-6483).

The STUN protocol implementation in libpurple in Pidgin before 2.10.8
allows remote STUN servers to cause a denial of service (out-of-bounds
write operation and application crash) by triggering a socket read
error (CVE-2013-6484).

Buffer overflow in util.c in libpurple in Pidgin before 2.10.8 allows
remote HTTP servers to cause a denial of service (application crash)
or possibly have unspecified other impact via an invalid chunk-size
field in chunked transfer-coding data (CVE-2013-6485).

gtkutils.c in Pidgin before 2.10.8 on Windows allows user-assisted
remote attackers to execute arbitrary programs via a message containing
a file: URL that is improperly handled during construction of an
explorer.exe command. NOTE: this vulnerability exists because of an
incomplete fix for CVE-2011-3185 (CVE-2013-6486).

Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu
(gg) parser in Pidgin before 2.10.8 allows remote attackers to have
an unspecified impact via a large Content-Length value, which triggers
a buffer overflow (CVE-2013-6487).

Integer signedness error in the MXit functionality in Pidgin
before 2.10.8 allows remote attackers to cause a denial of service
(segmentation fault) via a crafted emoticon value, which triggers an
integer overflow and a buffer overflow (CVE-2013-6489).

The SIMPLE protocol functionality in Pidgin before 2.10.8 allows remote
attackers to have an unspecified impact via a negative Content-Length
header, which triggers a buffer overflow (CVE-2013-6490).

The IRC protocol plugin in libpurple in Pidgin before 2.10.8 does
not validate argument counts, which allows remote IRC servers to
cause a denial of service (application crash) via a crafted message
(CVE-2014-0020).

This update provides pidgin 2.10.9, which is not vulnerable to
these issues.

Additionally a build problem conserning sqlite3 was discovered and
fixed, therefore fixed sqlite3 packages is also provided with this
advisory.

Aktualisierte Pakete

MES5 i586

 d5e069e752c3e17c4da5aa68e0b58861  mes5/i586/finch-2.10.9-0.1mdvmes5.2.i586.rpm
 59e74cb9433ce7913641c650902a46ef  mes5/i586/lemon-3.7.17-0.2mdvmes5.2.i586.rpm
 622382a4c075b1a34e07557893c46e37  mes5/i586/libfinch0-2.10.9-0.1mdvmes5.2.i586.rpm
 259cedc6c30b9a1b405a8648965ba698  mes5/i586/libpurple0-2.10.9-0.1mdvmes5.2.i586.rpm
 0ab50a1d9b026f40ff1bd1c387365942  mes5/i586/libpurple-devel-2.10.9-0.1mdvmes5.2.i586.rpm
 d74e7b6d9e51aba8934b35c586b91ad1  mes5/i586/libsqlite3_0-3.7.17-0.2mdvmes5.2.i586.rpm
 7e8328f32d8f5a04d467f681bcad63ea  mes5/i586/libsqlite3-devel-3.7.17-0.2mdvmes5.2.i586.rpm
 e4c5573f96eac1d929dd230a7865382b  mes5/i586/libsqlite3-static-devel-3.7.17-0.2mdvmes5.2.i586.rpm
 c04ea89dee22c74eafd9b3024d4ade75  mes5/i586/pidgin-2.10.9-0.1mdvmes5.2.i586.rpm
 e9b40d036b1a72333b6a3eeee09cccdb  mes5/i586/pidgin-bonjour-2.10.9-0.1mdvmes5.2.i586.rpm
 19813100aac040610354d571e9cca8bc  mes5/i586/pidgin-client-2.10.9-0.1mdvmes5.2.i586.rpm
 8136df89bdc4d840c9a54a52b0ed0e63  mes5/i586/pidgin-gevolution-2.10.9-0.1mdvmes5.2.i586.rpm
 fc2163f93b0ae4ead4c7435fb4f120e6  mes5/i586/pidgin-i18n-2.10.9-0.1mdvmes5.2.i586.rpm
 076a516d309c63bf23dd22f50a4784ae  mes5/i586/pidgin-meanwhile-2.10.9-0.1mdvmes5.2.i586.rpm
 5f97910f07a93533f37b9b85b6ce17c7  mes5/i586/pidgin-perl-2.10.9-0.1mdvmes5.2.i586.rpm
 0e253e8be6fe43e608e561dc8aea85e5  mes5/i586/pidgin-plugins-2.10.9-0.1mdvmes5.2.i586.rpm
 751f1e9e64876916d4e94d2b98c48305  mes5/i586/pidgin-silc-2.10.9-0.1mdvmes5.2.i586.rpm
 0fe038d2e0a1af10101a44c830d962e7  mes5/i586/pidgin-tcl-2.10.9-0.1mdvmes5.2.i586.rpm
 8a9c11da3d1b6631c5903bb17ceff35c  mes5/i586/sqlite3-tcl-3.7.17-0.2mdvmes5.2.i586.rpm
 c97a4fad0918784bc99108eae935b3cb  mes5/i586/sqlite3-tools-3.7.17-0.2mdvmes5.2.i586.rpm 
 eff3563dfb7c81e0b56bb75b122897d3  mes5/SRPMS/pidgin-2.10.9-0.1mdvmes5.2.src.rpm
 feb4686f16dd3bf86525874ecac26270  mes5/SRPMS/sqlite3-3.7.17-0.2mdvmes5.2.src.rpm

MES5 x86_64

 c542e6f719b399da75417f97274b21a4  mes5/x86_64/finch-2.10.9-0.1mdvmes5.2.x86_64.rpm
 dd418736a2897d4cb9057b0de35bc2aa  mes5/x86_64/lemon-3.7.17-0.2mdvmes5.2.x86_64.rpm
 325a2f54d9a9dab7091ca3db315d9a0d  mes5/x86_64/lib64finch0-2.10.9-0.1mdvmes5.2.x86_64.rpm
 06ffc4fe6aaff23bfa55b32f1b104553  mes5/x86_64/lib64purple0-2.10.9-0.1mdvmes5.2.x86_64.rpm
 95b09c1e20930274cc157b7cbdc1ed30  mes5/x86_64/lib64purple-devel-2.10.9-0.1mdvmes5.2.x86_64.rpm
 29400793bb255c219aaf632d2c29992e  mes5/x86_64/lib64sqlite3_0-3.7.17-0.2mdvmes5.2.x86_64.rpm
 7d50c2c9a0ba8dbb4503d998565c8054  mes5/x86_64/lib64sqlite3-devel-3.7.17-0.2mdvmes5.2.x86_64.rpm
 9e4b938ceb9ba6632c6793f8ae742918  mes5/x86_64/lib64sqlite3-static-devel-3.7.17-0.2mdvmes5.2.x86_64.rpm
 16fa661249fbe539a5767ba293e954f0  mes5/x86_64/pidgin-2.10.9-0.1mdvmes5.2.x86_64.rpm
 f2f946951136034027f0975f3ebcf13c  mes5/x86_64/pidgin-bonjour-2.10.9-0.1mdvmes5.2.x86_64.rpm
 8f69b2e27d0ded87aa76cb595775d744  mes5/x86_64/pidgin-client-2.10.9-0.1mdvmes5.2.x86_64.rpm
 7aa49805c62357537de5545f6c4c09b0  mes5/x86_64/pidgin-gevolution-2.10.9-0.1mdvmes5.2.x86_64.rpm
 d1d9652103f7b2ad47910dc95762d96e  mes5/x86_64/pidgin-i18n-2.10.9-0.1mdvmes5.2.x86_64.rpm
 17f1f4181d242156357053c51680b44e  mes5/x86_64/pidgin-meanwhile-2.10.9-0.1mdvmes5.2.x86_64.rpm
 b54af0150969364e33e458f33c4ec8f6  mes5/x86_64/pidgin-perl-2.10.9-0.1mdvmes5.2.x86_64.rpm
 7466096e476af27c108d24871106704d  mes5/x86_64/pidgin-plugins-2.10.9-0.1mdvmes5.2.x86_64.rpm
 6df18cb5be0699d8e7972eac6694290c  mes5/x86_64/pidgin-silc-2.10.9-0.1mdvmes5.2.x86_64.rpm
 c27fceeb99785261185d8864204d61e8  mes5/x86_64/pidgin-tcl-2.10.9-0.1mdvmes5.2.x86_64.rpm
 d05b1b1c334e339acb80c3557fd42cc8  mes5/x86_64/sqlite3-tcl-3.7.17-0.2mdvmes5.2.x86_64.rpm
 6b82dedf6e42f809ec943c076dff67f9  mes5/x86_64/sqlite3-tools-3.7.17-0.2mdvmes5.2.x86_64.rpm 
 eff3563dfb7c81e0b56bb75b122897d3  mes5/SRPMS/pidgin-2.10.9-0.1mdvmes5.2.src.rpm
 feb4686f16dd3bf86525874ecac26270  mes5/SRPMS/sqlite3-3.7.17-0.2mdvmes5.2.src.rpm

Referenzen