SCIENTIFIC-LINUX-ERRATA Archives

September 2009

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Troy Dawson <[log in to unmask]>
Reply To:
Troy Dawson <[log in to unmask]>
Date:
Tue, 22 Sep 2009 14:25:30 -0500
Content-Type:
text/plain
Parts/Attachments:
text/plain (91 lines)
Synopsis:	Moderate: pidgin security update
Issue date:	2009-09-21
CVE Names:	CVE-2009-2703 CVE-2009-3026 CVE-2009-3083
                   CVE-2009-3085

CVE-2009-3026 pidgin: ignores SSL/TLS requirements with old jabber servers
CVE-2009-2703 Pidgin: NULL pointer dereference by handling IRC topic(s) 
(DoS)
CVE-2009-3083 Pidgin: NULL pointer dereference by processing incomplete 
MSN SLP invite (DoS)
CVE-2009-3085 Pidgin: NULL pointer dereference by processing a custom 
smiley (DoS)

A NULL pointer dereference flaw was found in the way the Pidgin XMPP
protocol plug-in processes IQ error responses when trying to fetch a custom
smiley. A remote client could send a specially-crafted IQ error response
that would crash Pidgin. (CVE-2009-3085)

A NULL pointer dereference flaw was found in the way the Pidgin IRC
protocol plug-in handles IRC topics. A malicious IRC server could send a
specially-crafted IRC TOPIC message, which once received by Pidgin, 
would lead to a denial of service (Pidgin crash). (CVE-2009-2703)

It was discovered that, when connecting to certain, very old Jabber 
servers via XMPP, Pidgin may ignore the "Require SSL/TLS" setting. In 
these situations, a non-encrypted connection is established rather than 
the connection failing, causing the user to believe they are using an 
encrypted connection when they are not, leading to sensitive information 
disclosure (session sniffing). (CVE-2009-3026)

A NULL pointer dereference flaw was found in the way the Pidgin MSN
protocol plug-in handles improper MSNSLP invitations. A remote attacker
could send a specially-crafted MSNSLP invitation request, which once
accepted by a valid Pidgin user, would lead to a denial of service 
(Pidgin crash). (CVE-2009-3083)

Pidgin must be restarted for this update to take effect.

SL 4.x

      SRPMS:
pidgin-2.6.2-2.el4.src.rpm
      i386:
finch-2.6.2-2.el4.i386.rpm
finch-devel-2.6.2-2.el4.i386.rpm
libpurple-2.6.2-2.el4.i386.rpm
libpurple-devel-2.6.2-2.el4.i386.rpm
libpurple-perl-2.6.2-2.el4.i386.rpm
libpurple-tcl-2.6.2-2.el4.i386.rpm
pidgin-2.6.2-2.el4.i386.rpm
pidgin-devel-2.6.2-2.el4.i386.rpm
pidgin-perl-2.6.2-2.el4.i386.rpm
      x86_64:
finch-2.6.2-2.el4.x86_64.rpm
finch-devel-2.6.2-2.el4.x86_64.rpm
libpurple-2.6.2-2.el4.x86_64.rpm
libpurple-devel-2.6.2-2.el4.x86_64.rpm
libpurple-perl-2.6.2-2.el4.x86_64.rpm
libpurple-tcl-2.6.2-2.el4.x86_64.rpm
pidgin-2.6.2-2.el4.x86_64.rpm
pidgin-devel-2.6.2-2.el4.x86_64.rpm
pidgin-perl-2.6.2-2.el4.x86_64.rpm

SL 5.x

      SRPMS:
pidgin-2.6.2-2.el5.src.rpm
      i386:
finch-2.6.2-2.el5.i386.rpm
finch-devel-2.6.2-2.el5.i386.rpm
libpurple-2.6.2-2.el5.i386.rpm
libpurple-devel-2.6.2-2.el5.i386.rpm
libpurple-perl-2.6.2-2.el5.i386.rpm
libpurple-tcl-2.6.2-2.el5.i386.rpm
pidgin-2.6.2-2.el5.i386.rpm
pidgin-devel-2.6.2-2.el5.i386.rpm
pidgin-perl-2.6.2-2.el5.i386.rpm
      x86_64:
finch-2.6.2-2.el5.i386.rpm
finch-devel-2.6.2-2.el5.i386.rpm
libpurple-2.6.2-2.el5.i386.rpm
libpurple-devel-2.6.2-2.el5.i386.rpm
libpurple-perl-2.6.2-2.el5.i386.rpm
libpurple-tcl-2.6.2-2.el5.i386.rpm
pidgin-2.6.2-2.el5.i386.rpm
pidgin-devel-2.6.2-2.el5.i386.rpm
pidgin-perl-2.6.2-2.el5.i386.rpm

-Connie Sieh
-Troy Dawson

ATOM RSS1 RSS2