SuSE 11.3 Security Update : finch (SAT Patch Number 9213)

critical Nessus Plugin ID 74173

Synopsis

The remote SuSE 11 host is missing one or more security updates.

Description

The pidgin Instant Messenger has been updated to fix various security issues :

- Remotely triggerable crash in IRC argument parsing.
(CVE-2014-0020)

- Buffer overflow in SIMPLE header parsing.
(CVE-2013-6490)

- Buffer overflow in MXit emoticon parsing.
(CVE-2013-6489)

- Buffer overflow in Gadu-Gadu HTTP parsing.
(CVE-2013-6487)

- Pidgin uses clickable links to untrusted executables.
(CVE-2013-6486)

- Buffer overflow parsing chunked HTTP responses.
(CVE-2013-6485)

- Crash reading response from STUN server. (CVE-2013-6484)

- XMPP doesn't verify 'from' on some iq replies.
(CVE-2013-6483)

- NULL pointer dereference parsing SOAP data in MSN.
(CVE-2013-6482)

- NULL pointer dereference parsing OIM data in MSN.
(CVE-2013-6482)

- NULL pointer dereference parsing headers in MSN.
(CVE-2013-6482)

- Remote crash reading Yahoo! P2P message. (CVE-2013-6481)

- Remote crash parsing HTTP responses. (CVE-2013-6479)

- Crash when hovering pointer over a long URL.
(CVE-2013-6478)

- Crash handling bad XMPP timestamp. (CVE-2013-6477)

- Yahoo! remote crash from incorrect character encoding.
(CVE-2012-6152)

Solution

Apply SAT patch number 9213.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=861019

http://support.novell.com/security/cve/CVE-2012-6152.html

http://support.novell.com/security/cve/CVE-2013-6477.html

http://support.novell.com/security/cve/CVE-2013-6478.html

http://support.novell.com/security/cve/CVE-2013-6479.html

http://support.novell.com/security/cve/CVE-2013-6481.html

http://support.novell.com/security/cve/CVE-2013-6482.html

http://support.novell.com/security/cve/CVE-2013-6483.html

http://support.novell.com/security/cve/CVE-2013-6484.html

http://support.novell.com/security/cve/CVE-2013-6485.html

http://support.novell.com/security/cve/CVE-2013-6486.html

http://support.novell.com/security/cve/CVE-2013-6487.html

http://support.novell.com/security/cve/CVE-2013-6489.html

http://support.novell.com/security/cve/CVE-2013-6490.html

http://support.novell.com/security/cve/CVE-2014-0020.html

Plugin Details

Severity: Critical

ID: 74173

File Name: suse_11_finch-140508.nasl

Version: 1.3

Type: local

Agent: unix

Published: 5/24/2014

Updated: 1/19/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:11:libpurple-lang, p-cpe:/a:novell:suse_linux:11:finch, p-cpe:/a:novell:suse_linux:11:libpurple-tcl, p-cpe:/a:novell:suse_linux:11:libpurple-meanwhile, cpe:/o:novell:suse_linux:11, p-cpe:/a:novell:suse_linux:11:libpurple, p-cpe:/a:novell:suse_linux:11:pidgin

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 5/8/2014

Reference Information

CVE: CVE-2012-6152, CVE-2013-6477, CVE-2013-6478, CVE-2013-6479, CVE-2013-6481, CVE-2013-6482, CVE-2013-6483, CVE-2013-6484, CVE-2013-6485, CVE-2013-6486, CVE-2013-6487, CVE-2013-6489, CVE-2013-6490, CVE-2014-0020