![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.870637 |
Categoría: | Red Hat Local Security Checks |
Título: | RedHat Update for pidgin RHSA-2011:0616-01 |
Resumen: | The remote host is missing an update for the 'pidgin'; package(s) announced via the referenced advisory. |
Descripción: | Summary: The remote host is missing an update for the 'pidgin' package(s) announced via the referenced advisory. Vulnerability Insight: Pidgin is an instant messaging program which can log in to multiple accounts on multiple instant messaging networks simultaneously. Multiple NULL pointer dereference flaws were found in the way the Pidgin Yahoo! Messenger Protocol plug-in handled malformed YMSG packets. A remote attacker could use these flaws to crash Pidgin via a specially-crafted notification message. (CVE-2011-1091) Red Hat would like to thank the Pidgin project for reporting these issues. Upstream acknowledges Marius Wachtler as the original reporter. This update also fixes the following bugs: * Previous versions of the pidgin package did not properly clear certain data structures used in libpurple/cipher.c when attempting to free them. Partial information could potentially be extracted from the incorrectly cleared regions of the previously freed memory. With this update, data structures are properly cleared when freed. (BZ#684685) * This erratum upgrades Pidgin to upstream version 2.7.9. For a list of all changes addressed in this upgrade, (BZ#616917) * Some incomplete translations for the kn_IN and ta_IN locales have been corrected. (BZ#633860, BZ#640170) Users of pidgin should upgrade to these updated packages, which resolve these issues. Pidgin must be restarted for this update to take effect. Affected Software/OS: pidgin on Red Hat Enterprise Linux Desktop (v. 6), Red Hat Enterprise Linux Workstation (v. 6) Solution: Please Install the Updated Packages. CVSS Score: 4.0 CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2011-1091 43695 http://secunia.com/advisories/43695 43721 http://secunia.com/advisories/43721 46376 http://secunia.com/advisories/46376 46837 http://www.securityfocus.com/bid/46837 ADV-2011-0643 http://www.vupen.com/english/advisories/2011/0643 ADV-2011-0661 http://www.vupen.com/english/advisories/2011/0661 ADV-2011-0669 http://www.vupen.com/english/advisories/2011/0669 ADV-2011-0703 http://www.vupen.com/english/advisories/2011/0703 FEDORA-2011-3113 http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055874.html FEDORA-2011-3150 http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056309.html RHSA-2011:0616 http://www.redhat.com/support/errata/RHSA-2011-0616.html RHSA-2011:1371 http://www.redhat.com/support/errata/RHSA-2011-1371.html SSA:2011-070-02 http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.466884 http://developer.pidgin.im/viewmtn/revision/diff/5cbe18129b6e7c660bc093f7e5e1414ceca17d04/with/a7c415abba1f5f01f79295337518837f73d99bb7/libpurple/protocols/yahoo/libymsg.c http://developer.pidgin.im/viewmtn/revision/info/a7c415abba1f5f01f79295337518837f73d99bb7 http://www.pidgin.im/news/security/?id=51 https://bugzilla.redhat.com/show_bug.cgi?id=683031 openSUSE-SU-2012:0066 https://hermes.opensuse.org/messages/13195955 oval:org.mitre.oval:def:18402 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18402 pidgin-yahoo-protocol-dos(66055) https://exchange.xforce.ibmcloud.com/vulnerabilities/66055 |
Copyright | Copyright (C) 2012 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |