Debian DSA-1870-1 : pidgin - insufficient input validation

critical Nessus Plugin ID 44735

Language:

Synopsis

The remote Debian host is missing a security-related update.

Description

Federico Muttis discovered that libpurple, the shared library that adds support for various instant messaging networks to the pidgin IM client, is vulnerable to a heap-based buffer overflow. This issue exists because of an incomplete fix for CVE-2008-2927 and CVE-2009-1376. An attacker can exploit this by sending two consecutive SLP packets to a victim via MSN.

The first packet is used to create an SLP message object with an offset of zero, the second packet then contains a crafted offset which hits the vulnerable code originally fixed in CVE-2008-2927 and CVE-2009-1376 and allows an attacker to execute arbitrary code.

Note: Users with the 'Allow only the users below' setting are not vulnerable to this attack. If you can't install the below updates you may want to set this via Tools->Privacy.

Solution

Upgrade the pidgin packages.

For the stable distribution (lenny), this problem has been fixed in version 2.4.3-4lenny3.

See Also

https://security-tracker.debian.org/tracker/CVE-2008-2927

https://security-tracker.debian.org/tracker/CVE-2009-1376

https://www.debian.org/security/2009/dsa-1870

Plugin Details

Severity: Critical

ID: 44735

File Name: debian_DSA-1870.nasl

Version: 1.13

Type: local

Agent: unix

Published: 2/24/2010

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:pidgin, cpe:/o:debian:debian_linux:5.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/19/2009

Exploitable With

Core Impact

Reference Information

CVE: CVE-2009-2694

BID: 36071

CWE: 399

DSA: 1870