lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1LQAQq-0006vj-64@titan.mandriva.com>
Date: Thu, 22 Jan 2009 18:02:00 -0700
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2009:025 ] pidgin


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2009:025
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : pidgin
 Date    : January 22, 2009
 Affected: 2008.1
 _______________________________________________________________________

 Problem Description:

 The NSS plugin in libpurple in Pidgin 2.4.1 does not verify SSL
 certificates, which makes it easier for remote attackers to trick
 a user into accepting an invalid server certificate for a spoofed
 service. (CVE-2008-3532)
 
 Pidgin 2.4.1 allows remote attackers to cause a denial of service
 (crash) via a long filename that contains certain characters, as
 demonstrated using an MSN message that triggers the crash in the
 msn_slplink_process_msg function. (CVE-2008-2955)
 
 The UPnP functionality in Pidgin 2.0.0, and possibly other versions,
 allows remote attackers to trigger the download of arbitrary files
 and cause a denial of service (memory or disk consumption) via a UDP
 packet that specifies an arbitrary URL. (CVE-2008-2957)
 
 The updated packages have been patched to fix these issues.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2955
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2957
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3532
 _______________________________________________________________________

 Updated Packages:

 Mandriva Linux 2008.1:
 8d986cf90ce366f40da1ed22f99227e2  2008.1/i586/finch-2.4.1-2.3mdv2008.1.i586.rpm
 1591abeaedbde92f9e851fc163ecbc14  2008.1/i586/libfinch0-2.4.1-2.3mdv2008.1.i586.rpm
 81b2f07e1a3e82683dd761e913630ae8  2008.1/i586/libpurple0-2.4.1-2.3mdv2008.1.i586.rpm
 bc958e4178ea9037b2faef5e46fdc367  2008.1/i586/libpurple-devel-2.4.1-2.3mdv2008.1.i586.rpm
 9ad56f8214068aa578c74de4476b6a21  2008.1/i586/pidgin-2.4.1-2.3mdv2008.1.i586.rpm
 97e7beb6d69c8cd48427845537cd7092  2008.1/i586/pidgin-bonjour-2.4.1-2.3mdv2008.1.i586.rpm
 4bc7839dba2efbe27fb814be39c0e2d3  2008.1/i586/pidgin-client-2.4.1-2.3mdv2008.1.i586.rpm
 551a0888b40c5b234f14d9814a9249d2  2008.1/i586/pidgin-gevolution-2.4.1-2.3mdv2008.1.i586.rpm
 86ccded472fa0974e1a28be7d559ff4a  2008.1/i586/pidgin-i18n-2.4.1-2.3mdv2008.1.i586.rpm
 37869e45dee88264c183faf4f4ad5140  2008.1/i586/pidgin-meanwhile-2.4.1-2.3mdv2008.1.i586.rpm
 0c424324da44beb62b61243106fc3599  2008.1/i586/pidgin-mono-2.4.1-2.3mdv2008.1.i586.rpm
 c61e9c1cd651abcc805970df7dcae18a  2008.1/i586/pidgin-perl-2.4.1-2.3mdv2008.1.i586.rpm
 fbc16077149cff9111bda6ada529ef5f  2008.1/i586/pidgin-silc-2.4.1-2.3mdv2008.1.i586.rpm
 f97215d6643336a155e298a404386d7e  2008.1/i586/pidgin-tcl-2.4.1-2.3mdv2008.1.i586.rpm 
 a7816e51fd0c35798accad228aa67be9  2008.1/SRPMS/pidgin-2.4.1-2.3mdv2008.1.src.rpm

 Mandriva Linux 2008.1/X86_64:
 63ba74e6aeae1f940cdd4b5d6af3128b  2008.1/x86_64/finch-2.4.1-2.3mdv2008.1.x86_64.rpm
 c9cbed1c7267fd449e6c26ad8454e438  2008.1/x86_64/lib64finch0-2.4.1-2.3mdv2008.1.x86_64.rpm
 739eeb3e632023f89acd9e4baf826590  2008.1/x86_64/lib64purple0-2.4.1-2.3mdv2008.1.x86_64.rpm
 e63ce782ee2e8b9e157fa85ccd7f4511  2008.1/x86_64/lib64purple-devel-2.4.1-2.3mdv2008.1.x86_64.rpm
 e80d06d3e544b29f406c291a23b005b8  2008.1/x86_64/pidgin-2.4.1-2.3mdv2008.1.x86_64.rpm
 5aa3f2383fd83b025efa28bf9b6d817d  2008.1/x86_64/pidgin-bonjour-2.4.1-2.3mdv2008.1.x86_64.rpm
 cea0458cbf8fb2e16131e33a7f1e2587  2008.1/x86_64/pidgin-client-2.4.1-2.3mdv2008.1.x86_64.rpm
 54327daad8ed2658fe9c9bbe8482f388  2008.1/x86_64/pidgin-gevolution-2.4.1-2.3mdv2008.1.x86_64.rpm
 08d375b245f16b41077e6e9baf82c6df  2008.1/x86_64/pidgin-i18n-2.4.1-2.3mdv2008.1.x86_64.rpm
 536edfbb015f173dcc09a7c4481b20cd  2008.1/x86_64/pidgin-meanwhile-2.4.1-2.3mdv2008.1.x86_64.rpm
 6747c3d56d317d3733bea26a2d18fe9a  2008.1/x86_64/pidgin-mono-2.4.1-2.3mdv2008.1.x86_64.rpm
 ae3767379a0ccbcc577d8521fbed8432  2008.1/x86_64/pidgin-perl-2.4.1-2.3mdv2008.1.x86_64.rpm
 5e8b1bfd757e596536e0c0fa8f680aea  2008.1/x86_64/pidgin-silc-2.4.1-2.3mdv2008.1.x86_64.rpm
 9b2f9b0732f14981423f57454e68b3b1  2008.1/x86_64/pidgin-tcl-2.4.1-2.3mdv2008.1.x86_64.rpm 
 a7816e51fd0c35798accad228aa67be9  2008.1/SRPMS/pidgin-2.4.1-2.3mdv2008.1.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFJeOvHmqjQ0CJFipgRAraEAJ98EF/sllsypuWtjUk/7wUDNstJPACg85S/
MdDiL87nCpghlEbABOrCLmk=
=wRcj
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ