From Mageia wiki
Jump to: navigation, search

MGASA-2013-0058

Date: February 21st, 2013
Affected releases: 2
Media: Core


Description:
Updated pidgin packages fix security vulnerabilities:

Remote MXit user could specify local file path in Pidgin before 2.10.7.
The MXit protocol plugin saves an image to local disk using a filename
that could potentially be partially specified by the IM server or by a
remote user (CVE-2013-0271).

MXit buffer overflow reading data from network in Pidgin before 2.10.7.
The code did not respect the size of the buffer when parsing HTTP
headers, and a malicious server or man-in-the-middle could send
specially crafted data that could overflow the buffer. This could
lead to a crash or remote code execution (CVE-2013-0272).

Sametime crash with long user IDs in Pidgin before 2.10.7. libpurple
failed to null-terminate user IDs that were longer than 4096 bytes.
It's plausible that a malicious server could send one of these to us,
which would lead to a crash (CVE-2013-0273).

Crash when receiving a UPnP response with abnormally long values in
Pidgin before 2.10.7. libpurple failed to null-terminate some strings
when parsing the response from a UPnP router. This could lead to a
crash if a malicious user on your network responds with a specially
crafted message (CVE-2013-0274).

Pidgin has been updated to 2.10.7, which fixes these and other issues.


Updated Packages:
i586:
finch-2.10.7-1.1.mga2.i586.rpm
libfinch0-2.10.7-1.1.mga2.i586.rpm
libpurple0-2.10.7-1.1.mga2.i586.rpm
libpurple-devel-2.10.7-1.1.mga2.i586.rpm
pidgin-2.10.7-1.1.mga2.i586.rpm
pidgin-bonjour-2.10.7-1.1.mga2.i586.rpm
pidgin-client-2.10.7-1.1.mga2.i586.rpm
pidgin-i18n-2.10.7-1.1.mga2.noarch.rpm
pidgin-meanwhile-2.10.7-1.1.mga2.i586.rpm
pidgin-perl-2.10.7-1.1.mga2.i586.rpm
pidgin-plugins-2.10.7-1.1.mga2.i586.rpm
pidgin-silc-2.10.7-1.1.mga2.i586.rpm
pidgin-tcl-2.10.7-1.1.mga2.i586.rpm
pidgin-debug-2.10.7-1.1.mga2.i586.rpm

x86_64:
finch-2.10.7-1.1.mga2.x86_64.rpm
lib64finch0-2.10.7-1.1.mga2.x86_64.rpm
lib64purple0-2.10.7-1.1.mga2.x86_64.rpm
lib64purple-devel-2.10.7-1.1.mga2.x86_64.rpm
pidgin-2.10.7-1.1.mga2.x86_64.rpm
pidgin-bonjour-2.10.7-1.1.mga2.x86_64.rpm
pidgin-client-2.10.7-1.1.mga2.x86_64.rpm
pidgin-i18n-2.10.7-1.1.mga2.noarch.rpm
pidgin-meanwhile-2.10.7-1.1.mga2.x86_64.rpm
pidgin-perl-2.10.7-1.1.mga2.x86_64.rpm
pidgin-plugins-2.10.7-1.1.mga2.x86_64.rpm
pidgin-silc-2.10.7-1.1.mga2.x86_64.rpm
pidgin-tcl-2.10.7-1.1.mga2.x86_64.rpm
pidgin-debug-2.10.7-1.1.mga2.x86_64.rpm

SRPMS:
pidgin-2.10.7-1.1.mga2.src.rpm


References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0271
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0272
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0273
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0274
http://pidgin.im/news/security/?id=65
http://pidgin.im/news/security/?id=66
http://pidgin.im/news/security/?id=67
http://pidgin.im/news/security/?id=68
https://developer.pidgin.im/wiki/ChangeLog
https://bugs.mageia.org/show_bug.cgi?id=9064