Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2009:1060
The remote host is missing updates to Pidgin announced in
advisory RHSA-2009:1060.

A buffer overflow flaw was found in the way Pidgin initiates file transfers
when using the Extensible Messaging and Presence Protocol (XMPP). If a
Pidgin client initiates a file transfer, and the remote target sends a
malformed response, it could cause Pidgin to crash or, potentially, execute
arbitrary code with the permissions of the user running Pidgin. This flaw
only affects accounts using XMPP, such as Jabber and Google Talk.

A denial of service flaw was found in Pidgin's QQ protocol decryption
handler. When the QQ protocol decrypts packet information, heap data can be
overwritten, possibly causing Pidgin to crash. (CVE-2009-1374)

A flaw was found in the way Pidgin's PurpleCircBuffer object is expanded.
If the buffer is full when more data arrives, the data stored in this
buffer becomes corrupted. This corrupted data could result in confusing or
misleading data being presented to the user, or possibly crash Pidgin.

It was discovered that on 32-bit platforms, the Red Hat Security Advisory
RHSA-2008:0584 provided an incomplete fix for the integer overflow flaw
affecting Pidgin's MSN protocol handler. If a Pidgin client receives a
specially-crafted MSN message, it may be possible to execute arbitrary code
with the permissions of the user running Pidgin. (CVE-2009-1376)

Note: By default, when using an MSN account, only users on your buddy list
can send you messages. This prevents arbitrary MSN users from exploiting
this flaw.

All Pidgin users should upgrade to these updated packages, which contain
backported patches to resolve these issues. Pidgin must be restarted for
this update to take effect.

Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2009-1373
BugTraq ID: 35067
Debian Security Information: DSA-1805 (Google Search)
XForce ISS Database: pidgin-xmppsocks5-bo(50682)
Common Vulnerability Exposure (CVE) ID: CVE-2009-1374
XForce ISS Database: pidgin-decryptout-bo(50684)
Common Vulnerability Exposure (CVE) ID: CVE-2009-1375
XForce ISS Database: pidgin-purplecircbuffer-dos(50683)
Common Vulnerability Exposure (CVE) ID: CVE-2009-1376
XForce ISS Database: pidgin-msn-slp-bo(50680)
Common Vulnerability Exposure (CVE) ID: CVE-2008-2927
BugTraq ID: 29956
Bugtraq: 20080625 Pidgin 2.4.1 Vulnerability (Google Search)
Bugtraq: 20080806 rPSA-2008-0246-1 gaim (Google Search)
Bugtraq: 20080828 ZDI-08-054: Multiple Vendor libpurple MSN Protocol SLP Message Heap Overflow Vulnerability (Google Search)
Debian Security Information: DSA-1610 (Google Search)
XForce ISS Database: adium-msnprotocol-code-execution(44774)
CopyrightCopyright (c) 2009 E-Soft Inc.

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.