Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.66122
Categoría:Red Hat Local Security Checks
Título:RedHat Security Advisory RHSA-2009:1535
Resumen:The remote host is missing updates announced in;advisory RHSA-2009:1535.;;Pidgin is an instant messaging program which can log in to multiple;accounts on multiple instant messaging networks simultaneously.;;An invalid pointer dereference bug was found in the way the Pidgin OSCAR;protocol implementation processed lists of contacts. A remote attacker;could send a specially-crafted contact list to a user running Pidgin,;causing Pidgin to crash. (CVE-2009-3615);;A NULL pointer dereference flaw was found in the way the Pidgin IRC;protocol plug-in handles IRC topics. A malicious IRC server could send a;specially-crafted IRC TOPIC message, which once received by Pidgin, would;lead to a denial of service (Pidgin crash). (CVE-2009-2703);;A NULL pointer dereference flaw was found in the way the Pidgin MSN;protocol plug-in handles improper MSNSLP invitations. A remote attacker;could send a specially-crafted MSNSLP invitation request, which once;accepted by a valid Pidgin user, would lead to a denial of service (Pidgin;crash). (CVE-2009-3083);;All Pidgin users should upgrade to this updated package, which contains;backported patches to resolve these issues. Pidgin must be restarted for;this update to take effect.
Descripción:Summary:
The remote host is missing updates announced in
advisory RHSA-2009:1535.

Pidgin is an instant messaging program which can log in to multiple
accounts on multiple instant messaging networks simultaneously.

An invalid pointer dereference bug was found in the way the Pidgin OSCAR
protocol implementation processed lists of contacts. A remote attacker
could send a specially-crafted contact list to a user running Pidgin,
causing Pidgin to crash. (CVE-2009-3615)

A NULL pointer dereference flaw was found in the way the Pidgin IRC
protocol plug-in handles IRC topics. A malicious IRC server could send a
specially-crafted IRC TOPIC message, which once received by Pidgin, would
lead to a denial of service (Pidgin crash). (CVE-2009-2703)

A NULL pointer dereference flaw was found in the way the Pidgin MSN
protocol plug-in handles improper MSNSLP invitations. A remote attacker
could send a specially-crafted MSNSLP invitation request, which once
accepted by a valid Pidgin user, would lead to a denial of service (Pidgin
crash). (CVE-2009-3083)

All Pidgin users should upgrade to this updated package, which contains
backported patches to resolve these issues. Pidgin must be restarted for
this update to take effect.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2009-2703
BugTraq ID: 36277
http://www.securityfocus.com/bid/36277
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11379
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6435
http://secunia.com/advisories/36601
Common Vulnerability Exposure (CVE) ID: CVE-2009-3083
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11852
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6322
Common Vulnerability Exposure (CVE) ID: CVE-2009-3615
36719
http://www.securityfocus.com/bid/36719
37017
http://secunia.com/advisories/37017
37072
http://secunia.com/advisories/37072
ADV-2009-2949
http://www.vupen.com/english/advisories/2009/2949
ADV-2009-2951
http://www.vupen.com/english/advisories/2009/2951
ADV-2010-1020
http://www.vupen.com/english/advisories/2010/1020
MDVSA-2010:085
http://www.mandriva.com/security/advisories?name=MDVSA-2010:085
http://developer.pidgin.im/ticket/10481
http://developer.pidgin.im/viewmtn/revision/info/781682333aea0c801d280c3507ee25552a60bfc0
http://developer.pidgin.im/wiki/ChangeLog
http://www.pidgin.im/news/security/?id=41
oval:org.mitre.oval:def:18388
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18388
oval:org.mitre.oval:def:9414
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9414
pidgin-oscar-protocol-dos(53807)
https://exchange.xforce.ibmcloud.com/vulnerabilities/53807
CopyrightCopyright (C) 2009 E-Soft Inc.

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.