SB2014020605 - Multiple vulnerabilities in pidgin.im Pidgin
Published: February 6, 2014 Updated: January 1, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 14 secuirty vulnerabilities.
1) Buffer overflow (CVE-ID: CVE-2013-6490)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
The SIMPLE protocol functionality in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a negative Content-Length header, which triggers a buffer overflow.
2) Out-of-bounds read (CVE-ID: CVE-2013-6481)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in libpurple/protocols/yahoo/libymsg.c in Pidgin before 2.10.8. A remote attacker can perform a denial of service (crash) via a Yahoo! P2P message with a crafted length field, which triggers a buffer over-read.
3) NULL pointer dereference (CVE-ID: CVE-2013-6482)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error. A remote attacker can trigger denial of service conditions via a crafted (1) SOAP response, (2) OIM XML response, or (3) Content-Length header.
4) Input validation error (CVE-ID: CVE-2013-6487)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg) parser in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a large Content-Length value, which triggers a buffer overflow.
5) Input validation error (CVE-ID: CVE-2013-6489)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
Integer signedness error in the MXit functionality in Pidgin before 2.10.8 allows remote attackers to cause a denial of service (segmentation fault) via a crafted emoticon value, which triggers an integer overflow and a buffer overflow.
6) Input validation error (CVE-ID: CVE-2014-0020)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
The IRC protocol plugin in libpurple in Pidgin before 2.10.8 does not validate argument counts, which allows remote IRC servers to cause a denial of service (application crash) via a crafted message.
7) Input validation error (CVE-ID: CVE-2012-6152)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
The Yahoo! protocol plugin in libpurple in Pidgin before 2.10.8 does not properly validate UTF-8 data, which allows remote attackers to cause a denial of service (application crash) via crafted byte sequences.
8) Input validation error (CVE-ID: CVE-2013-6477)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
Multiple integer signedness errors in libpurple in Pidgin before 2.10.8 allow remote attackers to cause a denial of service (application crash) via a crafted timestamp value in an XMPP message.
9) Input validation error (CVE-ID: CVE-2013-6478)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
gtkimhtml.c in Pidgin before 2.10.8 does not properly interact with underlying library support for wide Pango layouts, which allows user-assisted remote attackers to cause a denial of service (application crash) via a long URL that is examined with a tooltip.
10) Resource management error (CVE-ID: CVE-2013-6479)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
util.c in libpurple in Pidgin before 2.10.8 does not properly allocate memory for HTTP responses that are inconsistent with the Content-Length header, which allows remote HTTP servers to cause a denial of service (application crash) via a crafted response.
11) NULL pointer dereference (CVE-ID: CVE-2013-6483)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error. A remote attacker can trigger denial of service conditions via a crafted reply.
12) Input validation error (CVE-ID: CVE-2013-6484)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
The STUN protocol implementation in libpurple in Pidgin before 2.10.8 allows remote STUN servers to cause a denial of service (out-of-bounds write operation and application crash) by triggering a socket read error.
13) Buffer overflow (CVE-ID: CVE-2013-6485)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
Buffer overflow in util.c in libpurple in Pidgin before 2.10.8 allows remote HTTP servers to cause a denial of service (application crash) or possibly have unspecified other impact via an invalid chunk-size field in chunked transfer-coding data.
14) Input validation error (CVE-ID: CVE-2013-6486)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
gtkutils.c in Pidgin before 2.10.8 on Windows allows user-assisted remote attackers to execute arbitrary programs via a message containing a file: URL that is improperly handled during construction of an explorer.exe command. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3185.
Remediation
Install update from vendor's website.
References
- http://hg.pidgin.im/pidgin/main/rev/6bd2dd10e5da
- http://www.debian.org/security/2014/dsa-2859
- http://www.pidgin.im/news/security/?id=84
- http://www.securityfocus.com/bid/65195
- http://www.ubuntu.com/usn/USN-2100-1
- https://rhn.redhat.com/errata/RHSA-2014-0139.html
- http://hg.pidgin.im/pidgin/main/rev/4d139ce8f7ec
- http://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html
- http://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html
- http://www.pidgin.im/news/security/?id=74
- http://www.pidgin.im/news/security/?id=75
- http://www.pidgin.im/news/security/?id=76
- http://www.pidgin.im/news/security/?id=77
- http://advisories.mageia.org/MGASA-2014-0074.html
- http://hg.pidgin.im/pidgin/main/rev/ec15aa187aa0
- http://libgadu.net/releases/1.11.3.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128277.html
- http://vrt-blog.snort.org/2014/01/vrt-2013-1001-cve-2013-6487-buffer.html
- http://www.debian.org/security/2014/dsa-2852
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:039
- http://www.pidgin.im/news/security/?id=82
- http://www.securityfocus.com/bid/65188
- http://www.ubuntu.com/usn/USN-2101-1
- https://security.gentoo.org/glsa/201508-02
- http://hg.pidgin.im/pidgin/main/rev/4c897372b5a4
- http://www.pidgin.im/news/security/?id=83
- http://www.securityfocus.com/bid/65192
- http://hg.pidgin.im/pidgin/main/rev/4d9be297d399
- http://hg.pidgin.im/pidgin/main/rev/5845d9fa7084
- http://hg.pidgin.im/pidgin/main/rev/6b0e0566af20
- http://hg.pidgin.im/pidgin/main/rev/7d0fb0c6d8d4
- http://hg.pidgin.im/pidgin/main/rev/9f132a6855cd
- http://hg.pidgin.im/pidgin/main/rev/a167504359e5
- http://pidgin.im/news/security/?id=85
- http://hg.pidgin.im/pidgin/main/rev/b0345c25f886
- http://pidgin.im/news/security/?id=70
- http://hg.pidgin.im/pidgin/main/rev/852014ae74a0
- http://pidgin.im/news/security/?id=71
- http://hg.pidgin.im/pidgin/main/rev/2bb66ef1475e
- http://pidgin.im/news/security/?id=72
- http://pidgin.im/pipermail/support/2013-March/012980.html
- http://pidgin.im/pipermail/support/2013-March/012981.html
- http://hg.pidgin.im/pidgin/main/rev/cd529e1158d3
- http://pidgin.im/news/security/?id=73
- http://hg.pidgin.im/pidgin/main/rev/93d4bff19574
- http://pidgin.im/news/security/?id=78
- http://hg.pidgin.im/pidgin/main/rev/932b985540e9
- http://pidgin.im/news/security/?id=79
- http://hg.pidgin.im/pidgin/main/rev/c9e5aba2dafd
- http://pidgin.im/news/security/?id=80
- http://www.securityfocus.com/bid/65243
- http://hg.pidgin.im/pidgin/main/rev/b2571530fa8b
- http://pidgin.im/news/security/?id=81
- http://www.securityfocus.com/bid/65189