SuSE 10 Security Update : pidgin, gaim and finch (ZYPP Patch Number 5573)

medium Nessus Plugin ID 51722

Synopsis

The remote SuSE 10 host is missing a security-related patch.

Description

- specially crafted MSN SLP messages could cause an integer overflow in pidgin. Attackers could potentially exploit that to execute arbitrary code. (CVE-2008-2927)

- overly long file names in MSN file transfers could crash pidgin. (CVE-2008-2955)

- SSL certifcates were not verfied. Therefore piding didn't notice faked certificates. (CVE-2008-3532)

Additionally a problem was fixed that prevented gaim clients from connecting to the ICQ network after a server change on July 1st 2008.

Solution

Apply ZYPP patch number 5573.

See Also

http://support.novell.com/security/cve/CVE-2008-2927.html

http://support.novell.com/security/cve/CVE-2008-2955.html

http://support.novell.com/security/cve/CVE-2008-3532.html

Plugin Details

Severity: Medium

ID: 51722

File Name: suse_finch-5573.nasl

Version: 1.7

Type: local

Agent: unix

Published: 1/27/2011

Updated: 1/14/2021

Supported Sensors: Continuous Assessment, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/o:suse:suse_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 9/3/2008

Reference Information

CVE: CVE-2008-2927, CVE-2008-2955, CVE-2008-3532

CWE: 189, 20, 310