|Category:||Red Hat Local Security Checks|
|Title:||RedHat Security Advisory RHSA-2008:0584|
The remote host is missing updates announced in
Pidgin is a multi-protocol Internet Messaging client.
An integer overflow flaw was found in Pidgin's MSN protocol handler. If a
user received a malicious MSN message, it was possible to execute arbitrary
code with the permissions of the user running Pidgin. (CVE-2008-2927)
Note: the default Pidgin privacy setting only allows messages from users in
the buddy list. This prevents arbitrary MSN users from exploiting this
This update also addresses the following bug:
* when attempting to connect to the ICQ network, Pidgin would fail to
connect, present an alert saying the The client version you are using is
too old, and de-activate the ICQ account. This update restores Pidgin's
ability to connect to the ICQ network.
All Pidgin users should upgrade to these updated packages, which contain
backported patches to resolve these issues.
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date
Risk factor : High
Common Vulnerability Exposure (CVE) ID: CVE-2008-2927|
BugTraq ID: 29956
Bugtraq: 20080625 Pidgin 2.4.1 Vulnerability (Google Search)
Bugtraq: 20080806 rPSA-2008-0246-1 gaim (Google Search)
Bugtraq: 20080828 ZDI-08-054: Multiple Vendor libpurple MSN Protocol SLP Message Heap Overflow Vulnerability (Google Search)
Debian Security Information: DSA-1610 (Google Search)
XForce ISS Database: adium-msnprotocol-code-execution(44774)
|Copyright||Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.