Executive Summary

Summary
Title Pidgin vulnerabilities
Informations
Name USN-1273-1 First vendor Publication 2011-11-21
Vendor Ubuntu Last vendor Modification 2011-11-21
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:N/A:P)
Cvss Base Score 4.3 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 11.04 - Ubuntu 10.10 - Ubuntu 10.04 LTS

Summary:

Pidgin could be made to crash if it received specially crafted network traffic.

Software Description: - pidgin: multi-protocol instant messaging client

Details:

Marius Wachtler discovered that Pidgin incorrectly handled malformed YMSG messages in the Yahoo! protocol handler. A remote attacker could send a specially crafted message and cause Pidgin to crash, leading to a denial of service. This issue only affected Ubuntu 10.04 LTS and 10.10. (CVE-2011-1091)

Marius Wachtler discovered that Pidgin incorrectly handled HTTP 100 responses in the MSN protocol handler. A remote attacker could send a specially crafted message and cause Pidgin to crash, leading to a denial of service. (CVE-2011-3184)

Diego Bauche Madero discovered that Pidgin incorrectly handled UTF-8 sequences in the SILC protocol handler. A remote attacker could send a specially crafted message and cause Pidgin to crash, leading to a denial of service. (CVE-2011-3594)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 11.04:
pidgin 1:2.7.11-1ubuntu2.1

Ubuntu 10.10:
pidgin 1:2.7.3-1ubuntu3.3

Ubuntu 10.04 LTS:
pidgin 1:2.6.6-1ubuntu4.4

After a standard system update you need to restart Pidgin to make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-1273-1
CVE-2011-1091, CVE-2011-3184, CVE-2011-3594

Package Information:
https://launchpad.net/ubuntu/+source/pidgin/1:2.7.11-1ubuntu2.1
https://launchpad.net/ubuntu/+source/pidgin/1:2.7.3-1ubuntu3.3
https://launchpad.net/ubuntu/+source/pidgin/1:2.6.6-1ubuntu4.4

Original Source

Url : http://www.ubuntu.com/usn/USN-1273-1

CWE : Common Weakness Enumeration

% Id Name
50 % CWE-399 Resource Management Errors
50 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:15080
 
Oval ID: oval:org.mitre.oval:def:15080
Title: USN-1273-1 -- Pidgin vulnerabilities
Description: pidgin: multi-protocol instant messaging client Pidgin could be made to crash if it received specially crafted network traffic.
Family: unix Class: patch
Reference(s): USN-1273-1
CVE-2011-1091
CVE-2011-3184
CVE-2011-3594
Version: 7
Platform(s): Ubuntu 11.04
Ubuntu 10.04
Ubuntu 10.10
Product(s): Pidgin
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18034
 
Oval ID: oval:org.mitre.oval:def:18034
Title: The g_markup_escape_text function in the SILC protocol plug-in in libpurple 2.10.0 and earlier, as used in Pidgin and possibly other products, allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with certain versions of glib2
Description: The g_markup_escape_text function in the SILC protocol plug-in in libpurple 2.10.0 and earlier, as used in Pidgin and possibly other products, allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with certain versions of glib2.
Family: windows Class: vulnerability
Reference(s): CVE-2011-3594
Version: 3
Platform(s): Microsoft Windows 2000
Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows XP
Microsoft Windows 8
Microsoft Windows Server 2012
Product(s): Pidgin
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18284
 
Oval ID: oval:org.mitre.oval:def:18284
Title: The msn_httpconn_parse_data function in httpconn.c in the MSN protocol plugin in libpurple in Pidgin before 2.10.0 does not properly handle HTTP 100 responses, which allows remote attackers to cause a denial of service (incorrect memory access and application crash) via vectors involving a crafted server message
Description: The msn_httpconn_parse_data function in httpconn.c in the MSN protocol plugin in libpurple in Pidgin before 2.10.0 does not properly handle HTTP 100 responses, which allows remote attackers to cause a denial of service (incorrect memory access and application crash) via vectors involving a crafted server message.
Family: windows Class: vulnerability
Reference(s): CVE-2011-3184
Version: 3
Platform(s): Microsoft Windows 2000
Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows XP
Microsoft Windows 8
Microsoft Windows Server 2012
Product(s): Pidgin
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18402
 
Oval ID: oval:org.mitre.oval:def:18402
Title: libymsg.c in the Yahoo! protocol plugin in libpurple in Pidgin 2.6.0 through 2.7.10 allows (1) remote authenticated users to cause a denial of service (NULL pointer dereference and application crash) via a malformed YMSG notification packet, and allows (2) remote Yahoo! servers to cause a denial of service (NULL pointer dereference and application crash) via a malformed YMSG SMS message
Description: libymsg.c in the Yahoo! protocol plugin in libpurple in Pidgin 2.6.0 through 2.7.10 allows (1) remote authenticated users to cause a denial of service (NULL pointer dereference and application crash) via a malformed YMSG notification packet, and allows (2) remote Yahoo! servers to cause a denial of service (NULL pointer dereference and application crash) via a malformed YMSG SMS message.
Family: windows Class: vulnerability
Reference(s): CVE-2011-1091
Version: 3
Platform(s): Microsoft Windows 2000
Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows XP
Microsoft Windows 8
Microsoft Windows Server 2012
Product(s): Pidgin
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21773
 
Oval ID: oval:org.mitre.oval:def:21773
Title: RHSA-2011:1371: pidgin security update (Moderate)
Description: The g_markup_escape_text function in the SILC protocol plug-in in libpurple 2.10.0 and earlier, as used in Pidgin and possibly other products, allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with certain versions of glib2.
Family: unix Class: patch
Reference(s): RHSA-2011:1371-01
CESA-2011:1371
CVE-2011-1091
CVE-2011-3594
Version: 29
Platform(s): Red Hat Enterprise Linux 5
CentOS Linux 5
Product(s): pidgin
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23128
 
Oval ID: oval:org.mitre.oval:def:23128
Title: ELSA-2011:1371: pidgin security update (Moderate)
Description: The g_markup_escape_text function in the SILC protocol plug-in in libpurple 2.10.0 and earlier, as used in Pidgin and possibly other products, allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with certain versions of glib2.
Family: unix Class: patch
Reference(s): ELSA-2011:1371-01
CVE-2011-1091
CVE-2011-3594
Version: 13
Platform(s): Oracle Linux 5
Product(s): pidgin
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 47
Application 58

OpenVAS Exploits

Date Description
2012-08-30 Name : Fedora Update for pidgin FEDORA-2012-8669
File : nvt/gb_fedora_2012_8669_pidgin_fc15.nasl
2012-08-10 Name : Gentoo Security Advisory GLSA 201206-11 (Pidgin)
File : nvt/glsa_201206_11.nasl
2012-07-30 Name : CentOS Update for finch CESA-2011:1371 centos4 x86_64
File : nvt/gb_CESA-2011_1371_finch_centos4_x86_64.nasl
2012-07-30 Name : CentOS Update for finch CESA-2011:1371 centos5 x86_64
File : nvt/gb_CESA-2011_1371_finch_centos5_x86_64.nasl
2012-07-16 Name : Fedora Update for pidgin FEDORA-2012-10294
File : nvt/gb_fedora_2012_10294_pidgin_fc16.nasl
2012-06-11 Name : Fedora Update for pidgin FEDORA-2012-8686
File : nvt/gb_fedora_2012_8686_pidgin_fc16.nasl
2012-06-06 Name : RedHat Update for pidgin RHSA-2011:0616-01
File : nvt/gb_RHSA-2011_0616-01_pidgin.nasl
2012-04-02 Name : Fedora Update for pidgin FEDORA-2011-17558
File : nvt/gb_fedora_2011_17558_pidgin_fc16.nasl
2012-04-02 Name : Fedora Update for pidgin FEDORA-2012-4600
File : nvt/gb_fedora_2012_4600_pidgin_fc15.nasl
2012-03-26 Name : Fedora Update for pidgin FEDORA-2012-4595
File : nvt/gb_fedora_2012_4595_pidgin_fc16.nasl
2012-01-09 Name : Fedora Update for pidgin FEDORA-2011-17546
File : nvt/gb_fedora_2011_17546_pidgin_fc15.nasl
2011-12-12 Name : Mandriva Update for pidgin MDVSA-2011:183 (pidgin)
File : nvt/gb_mandriva_MDVSA_2011_183.nasl
2011-11-25 Name : Ubuntu Update for pidgin USN-1273-1
File : nvt/gb_ubuntu_USN_1273_1.nasl
2011-11-11 Name : CentOS Update for finch CESA-2011:1371 centos4 i386
File : nvt/gb_CESA-2011_1371_finch_centos4_i386.nasl
2011-10-18 Name : CentOS Update for finch CESA-2011:1371 centos5 i386
File : nvt/gb_CESA-2011_1371_finch_centos5_i386.nasl
2011-10-14 Name : RedHat Update for pidgin RHSA-2011:1371-01
File : nvt/gb_RHSA-2011_1371-01_pidgin.nasl
2011-09-12 Name : Fedora Update for pidgin FEDORA-2011-11595
File : nvt/gb_fedora_2011_11595_pidgin_fc14.nasl
2011-09-12 Name : Mandriva Update for pidgin MDVSA-2011:132 (pidgin)
File : nvt/gb_mandriva_MDVSA_2011_132.nasl
2011-09-09 Name : Pidgin Libpurple Protocol Plugins Denial of Service Vulnerabilities (Win)
File : nvt/gb_pidgin_libpurple_protocol_plugins_dos_vuln_win.nasl
2011-09-07 Name : Fedora Update for pidgin FEDORA-2011-11544
File : nvt/gb_fedora_2011_11544_pidgin_fc15.nasl
2011-07-18 Name : Fedora Update for pidgin FEDORA-2011-8917
File : nvt/gb_fedora_2011_8917_pidgin_fc14.nasl
2011-03-24 Name : Fedora Update for pidgin FEDORA-2011-3132
File : nvt/gb_fedora_2011_3132_pidgin_fc13.nasl
2011-03-24 Name : Fedora Update for pidgin FEDORA-2011-3113
File : nvt/gb_fedora_2011_3113_pidgin_fc14.nasl
2011-03-24 Name : Mandriva Update for pidgin MDVSA-2011:050 (pidgin)
File : nvt/gb_mandriva_MDVSA_2011_050.nasl
2011-03-22 Name : Pidgin Yahoo Protocol 'YMSG' NULL Pointer Dereference Denial of Service Vulne...
File : nvt/gb_pidgin_ymsg_dos_vuln_win.nasl
0000-00-00 Name : Slackware Advisory SSA:2011-070-02 pidgin
File : nvt/esoft_slk_ssa_2011_070_02.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
75994 Pidgin libpurple/protocols/silc/ops.c silc_private_message() Function Out-of-...

74921 Pidgin libpurple Yahoo! Plugin libymsg.c Malformed YMSG Message Handling Remo...

74826 Pidgin libpurple MSN Protocol Plugin httpconn.c msn_httpconn_parse_data Funct...

Nessus® Vulnerability Scanner

Date Description
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : suse_11_4_finch-111219.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2011-35.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2012-29.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : suse_11_3_finch-111128.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : suse_11_3_finch-111219.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : suse_11_4_finch-111128.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2011-1371.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20111013_pidgin_on_SL4_x.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20110519_pidgin_on_SL6_x.nasl - Type : ACT_GATHER_INFO
2012-06-22 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201206-11.nasl - Type : ACT_GATHER_INFO
2012-01-10 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_finch-7901.nasl - Type : ACT_GATHER_INFO
2012-01-10 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_finch-111226.nasl - Type : ACT_GATHER_INFO
2012-01-09 Name : The remote Fedora host is missing a security update.
File : fedora_2011-17546.nasl - Type : ACT_GATHER_INFO
2012-01-06 Name : The remote Fedora host is missing a security update.
File : fedora_2011-17558.nasl - Type : ACT_GATHER_INFO
2011-12-15 Name : An instant messaging client installed on the remote Windows host is potential...
File : pidgin_2_10_1.nasl - Type : ACT_GATHER_INFO
2011-12-13 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_finch-111104.nasl - Type : ACT_GATHER_INFO
2011-12-13 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_finch-111105.nasl - Type : ACT_GATHER_INFO
2011-12-13 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_finch-7827.nasl - Type : ACT_GATHER_INFO
2011-12-12 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2011-183.nasl - Type : ACT_GATHER_INFO
2011-11-22 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-1273-1.nasl - Type : ACT_GATHER_INFO
2011-10-17 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2011-1371.nasl - Type : ACT_GATHER_INFO
2011-10-14 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2011-1371.nasl - Type : ACT_GATHER_INFO
2011-09-07 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2011-132.nasl - Type : ACT_GATHER_INFO
2011-09-07 Name : The remote Fedora host is missing a security update.
File : fedora_2011-11595.nasl - Type : ACT_GATHER_INFO
2011-08-31 Name : The remote Fedora host is missing a security update.
File : fedora_2011-11544.nasl - Type : ACT_GATHER_INFO
2011-08-22 Name : An instant messaging client installed on the remote Windows host has multiple...
File : pidgin_2_10_0.nasl - Type : ACT_GATHER_INFO
2011-05-20 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2011-0616.nasl - Type : ACT_GATHER_INFO
2011-03-22 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2011-050.nasl - Type : ACT_GATHER_INFO
2011-03-21 Name : The remote Fedora host is missing a security update.
File : fedora_2011-3150.nasl - Type : ACT_GATHER_INFO
2011-03-21 Name : The remote Fedora host is missing a security update.
File : fedora_2011-3132.nasl - Type : ACT_GATHER_INFO
2011-03-15 Name : The remote Fedora host is missing a security update.
File : fedora_2011-3113.nasl - Type : ACT_GATHER_INFO
2011-03-14 Name : The remote Slackware host is missing a security update.
File : Slackware_SSA_2011-070-02.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:59:18
  • Multiple Updates