lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1MW1Fk-0005VR-Td@titan.mandriva.com>
Date: Wed, 29 Jul 2009 06:59:00 +0200
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2009:173 ] pidgin


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2009:173
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : pidgin
 Date    : July 29, 2009
 Affected: Enterprise Server 5.0
 _______________________________________________________________________

 Problem Description:

 Security vulnerabilities has been identified and fixed in pidgin:
 
 Buffer overflow in the XMPP SOCKS5 bytestream server in Pidgin
 (formerly Gaim) before 2.5.6 allows remote authenticated users to
 execute arbitrary code via vectors involving an outbound XMPP file
 transfer. NOTE: some of these details are obtained from third party
 information (CVE-2009-1373).
 
 Buffer overflow in the decrypt_out function in Pidgin (formerly Gaim)
 before 2.5.6 allows remote attackers to cause a denial of service
 (application crash) via a QQ packet (CVE-2009-1374).
 
 The PurpleCircBuffer implementation in Pidgin (formerly Gaim) before
 2.5.6 does not properly maintain a certain buffer, which allows
 remote attackers to cause a denial of service (memory corruption
 and application crash) via vectors involving the (1) XMPP or (2)
 Sametime protocol (CVE-2009-1375).
 
 Multiple integer overflows in the msn_slplink_process_msg functions in
 the MSN protocol handler in (1) libpurple/protocols/msn/slplink.c and
 (2) libpurple/protocols/msnp9/slplink.c in Pidgin (formerly Gaim)
 before 2.5.6 on 32-bit platforms allow remote attackers to execute
 arbitrary code via a malformed SLP message with a crafted offset
 value, leading to buffer overflows. NOTE: this issue exists because
 of an incomplete fix for CVE-2008-2927 (CVE-2009-1376).
 
 This update provides pidgin 2.5.8, which is not vulnerable to these
 issues.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1373
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1374
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1375
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1376
 http://pidgin.im/news/security/
 _______________________________________________________________________

 Updated Packages:

 Mandriva Enterprise Server 5:
 8fceb83b3c8d05b8e19c7c6d55f7c8dc  mes5/i586/finch-2.5.8-0.2mdvmes5.i586.rpm
 087b107937da63fd2f36bacd6893ec14  mes5/i586/libfinch0-2.5.8-0.2mdvmes5.i586.rpm
 5965e9790058b2283859f2329dd3f5f5  mes5/i586/libmeanwhile1-1.0.2-2.1mdvmes5.i586.rpm
 d09c178fa8e7b23d4217ce8016742ed8  mes5/i586/libmeanwhile1-devel-1.0.2-2.1mdvmes5.i586.rpm
 9c5845a75b7663c5b10e5aaee2330dcc  mes5/i586/libmeanwhile1-doc-1.0.2-2.1mdvmes5.i586.rpm
 fc57a75250ddde1c86486c6444f403a2  mes5/i586/libpurple0-2.5.8-0.2mdvmes5.i586.rpm
 4615f81a030de2af18af27a41c039be0  mes5/i586/libpurple-devel-2.5.8-0.2mdvmes5.i586.rpm
 650b3c09bfd6e5b07014d763cabcc23e  mes5/i586/pidgin-2.5.8-0.2mdvmes5.i586.rpm
 dadfa4fd0dce10a72829235f2f9afd27  mes5/i586/pidgin-bonjour-2.5.8-0.2mdvmes5.i586.rpm
 cc3e9966e475eebb01003c36f65991dc  mes5/i586/pidgin-client-2.5.8-0.2mdvmes5.i586.rpm
 01768025392289d917d77f5344258249  mes5/i586/pidgin-gevolution-2.5.8-0.2mdvmes5.i586.rpm
 69b9c804c0b1a14c06b64e5a383944ef  mes5/i586/pidgin-i18n-2.5.8-0.2mdvmes5.i586.rpm
 51ee90ff3b21ff9cf9891104e6c1e6dd  mes5/i586/pidgin-meanwhile-2.5.8-0.2mdvmes5.i586.rpm
 f8d49efc67bc6914d1fc2404f88e4124  mes5/i586/pidgin-mono-2.5.8-0.2mdvmes5.i586.rpm
 bcb84b61b39dc33ed0b5803548b512c0  mes5/i586/pidgin-perl-2.5.8-0.2mdvmes5.i586.rpm
 e8f3cd8b45c9d38e4def57d1c3352d36  mes5/i586/pidgin-plugins-2.5.8-0.2mdvmes5.i586.rpm
 d2537da945cf826f5974de541c5e7197  mes5/i586/pidgin-silc-2.5.8-0.2mdvmes5.i586.rpm
 f29a596d394d9c0a5bf742e83700048a  mes5/i586/pidgin-tcl-2.5.8-0.2mdvmes5.i586.rpm 
 afc32532d57b156a66fb575fc3b23ee5  mes5/SRPMS/meanwhile-1.0.2-2.1mdvmes5.src.rpm
 46a06badda4442d8c7bd313371c4319e  mes5/SRPMS/pidgin-2.5.8-0.2mdvmes5.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 38fb3a6108e404216b379eaab0920033  mes5/x86_64/finch-2.5.8-0.2mdvmes5.x86_64.rpm
 a8697503bc8891855790f30cfbb2bd28  mes5/x86_64/lib64finch0-2.5.8-0.2mdvmes5.x86_64.rpm
 b6d59030d2367052f9d7c47c39ef7db5  mes5/x86_64/lib64meanwhile1-1.0.2-2.1mdvmes5.x86_64.rpm
 0c4f3335c648f8763418d07f1530695e  mes5/x86_64/lib64meanwhile1-devel-1.0.2-2.1mdvmes5.x86_64.rpm
 e172b9fda1fd82f2e9548998ab278444  mes5/x86_64/lib64meanwhile1-doc-1.0.2-2.1mdvmes5.x86_64.rpm
 b69d53282ed78f9364978a74b27dd5b4  mes5/x86_64/lib64purple0-2.5.8-0.2mdvmes5.x86_64.rpm
 721f8e4dc2aae949bcd847bd4f48ae8e  mes5/x86_64/lib64purple-devel-2.5.8-0.2mdvmes5.x86_64.rpm
 dde2286db18bb676591ee1e5359f328a  mes5/x86_64/pidgin-2.5.8-0.2mdvmes5.x86_64.rpm
 a5ba4db1a6a3a7ed70cbd26f51996fad  mes5/x86_64/pidgin-bonjour-2.5.8-0.2mdvmes5.x86_64.rpm
 8540b4360131ccc61a766ffe70accd72  mes5/x86_64/pidgin-client-2.5.8-0.2mdvmes5.x86_64.rpm
 e61d2242bb8106e27539d9f2d2805c17  mes5/x86_64/pidgin-gevolution-2.5.8-0.2mdvmes5.x86_64.rpm
 4b2f52bacc076f31264e2a501fe609a5  mes5/x86_64/pidgin-i18n-2.5.8-0.2mdvmes5.x86_64.rpm
 782c2dae71574c8a21a0d9813bfda424  mes5/x86_64/pidgin-meanwhile-2.5.8-0.2mdvmes5.x86_64.rpm
 5b45076bc9438853886c22c79dcda298  mes5/x86_64/pidgin-mono-2.5.8-0.2mdvmes5.x86_64.rpm
 4651354914578fc9b7fa930a5134c016  mes5/x86_64/pidgin-perl-2.5.8-0.2mdvmes5.x86_64.rpm
 23c753fa429158e4e4589cdfd8e8d0d7  mes5/x86_64/pidgin-plugins-2.5.8-0.2mdvmes5.x86_64.rpm
 03db701b5da3f39d8e86aaccf4db25fe  mes5/x86_64/pidgin-silc-2.5.8-0.2mdvmes5.x86_64.rpm
 1e20f2237f16dda6b90c7621526e0c89  mes5/x86_64/pidgin-tcl-2.5.8-0.2mdvmes5.x86_64.rpm 
 afc32532d57b156a66fb575fc3b23ee5  mes5/SRPMS/meanwhile-1.0.2-2.1mdvmes5.src.rpm
 46a06badda4442d8c7bd313371c4319e  mes5/SRPMS/pidgin-2.5.8-0.2mdvmes5.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFKb6z2mqjQ0CJFipgRAvszAJ9YTMpiSmEpKtL//ZGzvWHqOPzjmgCgsMpW
A0bUhj6wrTOTJBLJwMLwSPY=
=LiUJ
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ