openSUSE 10 Security Update : finch (finch-6351)

high Nessus Plugin ID 41999

Synopsis

The remote openSUSE host is missing a security update.

Description

Several bugfixes were done for the Instant Messenger Pidgin :

- Malformed responses to file transfers could cause a buffer overflow in pidgin (CVE-2009-1373) and specially crafted packets could crash it (CVE-2009-1375).

- The fix against integer overflows in the msn protocol handling was incomplete (CVE-2009-1376).

- Fixed misparsing ICQ message as SMS DoS (CVE-2009-1889, Pidgin#9483).

Also the Yahoo IM protocol was made to work again.

Solution

Update the affected finch packages.

Plugin Details

Severity: High

ID: 41999

File Name: suse_finch-6351.nasl

Version: 1.12

Type: local

Agent: unix

Published: 10/6/2009

Updated: 1/14/2021

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:libpurple, p-cpe:/a:novell:opensuse:libpurple-meanwhile, p-cpe:/a:novell:opensuse:pidgin-devel, p-cpe:/a:novell:opensuse:libpurple-mono, p-cpe:/a:novell:opensuse:libpurple-devel, p-cpe:/a:novell:opensuse:finch-devel, cpe:/o:novell:opensuse:10.3, p-cpe:/a:novell:opensuse:pidgin, p-cpe:/a:novell:opensuse:finch

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/13/2009

Reference Information

CVE: CVE-2009-1373, CVE-2009-1375, CVE-2009-1376, CVE-2009-1889

CWE: 119, 189, 399