Ubuntu 2100-1: Pidgin vulnerabilities

    Date06 Feb 2014
    CategoryUbuntu
    85
    Posted ByLinuxSecurity Advisories
    Several security issues were fixed in Pidgin.
    ==========================================================================
    Ubuntu Security Notice USN-2100-1
    February 06, 2014
    
    pidgin vulnerabilities
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 13.10
    - Ubuntu 12.10
    - Ubuntu 12.04 LTS
    
    Summary:
    
    Several security issues were fixed in Pidgin.
    
    Software Description:
    - pidgin: graphical multi-protocol instant messaging client for X
    
    Details:
    
    Thijs Alkemade and Robert Vehse discovered that Pidgin incorrectly handled
    the Yahoo! protocol. A remote attacker could use this issue to cause
    Pidgin to crash, resulting in a denial of service. (CVE-2012-6152)
    
    Jaime Breva Ribes discovered that Pidgin incorrectly handled the XMPP
    protocol. A remote attacker could use this issue to cause Pidgin to crash,
    resulting in a denial of service. (CVE-2013-6477)
    
    It was discovered that Pidgin incorrecly handled long URLs. A remote
    attacker could use this issue to cause Pidgin to crash, resulting in a
    denial of service. (CVE-2013-6478)
    
    Jacob Appelbaum discovered that Pidgin incorrectly handled certain HTTP
    responses. A malicious remote server or a man in the middle could use this
    issue to cause Pidgin to crash, resulting in a denial of service.
    (CVE-2013-6479)
    
    Daniel Atallah discovered that Pidgin incorrectly handled the Yahoo!
    protocol. A remote attacker could use this issue to cause Pidgin to crash,
    resulting in a denial of service. (CVE-2013-6481)
    
    Fabian Yamaguchi and Christian Wressnegger discovered that Pidgin
    incorrectly handled the MSN protocol. A remote attacker could use this
    issue to cause Pidgin to crash, resulting in a denial of service.
    (CVE-2013-6482)
    
    Fabian Yamaguchi and Christian Wressnegger discovered that Pidgin
    incorrectly handled XMPP iq replies. A remote attacker could use this
    issue to spoof messages. (CVE-2013-6483)
    
    It was discovered that Pidgin incorrectly handled STUN server responses. A
    remote attacker could use this issue to cause Pidgin to crash, resulting in
    a denial of service. (CVE-2013-6484)
    
    Matt Jones discovered that Pidgin incorrectly handled certain chunked HTTP
    responses. A malicious remote server or a man in the middle could use this
    issue to cause Pidgin to crash, resulting in a denial of service, or
    possibly execute arbitrary code. (CVE-2013-6485)
    
    Yves Younan and Ryan Pentney discovered that Pidgin incorrectly handled
    certain Gadu-Gadu HTTP messages. A malicious remote server or a man in the
    middle could use this issue to cause Pidgin to crash, resulting in a denial
    of service, or possibly execute arbitrary code. (CVE-2013-6487)
    
    Yves Younan and Pawel Janic discovered that Pidgin incorrectly handled MXit
    emoticons. A remote attacker could use this issue to cause Pidgin to crash,
    resulting in a denial of service, or possibly execute arbitrary code.
    (CVE-2013-6489)
    
    Yves Younan discovered that Pidgin incorrectly handled SIMPLE headers. A
    remote attacker could use this issue to cause Pidgin to crash, resulting in
    a denial of service, or possibly execute arbitrary code. (CVE-2013-6490)
    
    Daniel Atallah discovered that Pidgin incorrectly handled IRC argument
    parsing. A malicious remote server or a man in the middle could use this
    issue to cause Pidgin to crash, resulting in a denial of service.
    (CVE-2014-0020)
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 13.10:
      libpurple0                      1:2.10.7-0ubuntu4.1.13.10.1
      pidgin                          1:2.10.7-0ubuntu4.1.13.10.1
    
    Ubuntu 12.10:
      libpurple0                      1:2.10.6-0ubuntu2.3
      pidgin                          1:2.10.6-0ubuntu2.3
    
    Ubuntu 12.04 LTS:
      libpurple0                      1:2.10.3-0ubuntu1.4
      pidgin                          1:2.10.3-0ubuntu1.4
    
    After a standard system update you need to restart Pidgin to make all the
    necessary changes.
    
    References:
      http://www.ubuntu.com/usn/usn-2100-1
      CVE-2012-6152, CVE-2013-6477, CVE-2013-6478, CVE-2013-6479,
      CVE-2013-6481, CVE-2013-6482, CVE-2013-6483, CVE-2013-6484,
      CVE-2013-6485, CVE-2013-6487, CVE-2013-6489, CVE-2013-6490,
      CVE-2014-0020
    
    Package Information:
      https://launchpad.net/ubuntu/+source/pidgin/1:2.10.7-0ubuntu4.1.13.10.1
      https://launchpad.net/ubuntu/+source/pidgin/1:2.10.6-0ubuntu2.3
      https://launchpad.net/ubuntu/+source/pidgin/1:2.10.3-0ubuntu1.4
    
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"25","type":"x","order":"1","pct":54.35,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":10.87,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"16","type":"x","order":"3","pct":34.78,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.