Vulnerabilities > CVE-2017-2640 - Out-of-bounds Write vulnerability in multiple products

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
pidgin
debian
redhat
CWE-787
nessus

Summary

An out-of-bounds write flaw was found in the way Pidgin before 2.12.0 processed XML content. A malicious remote server could potentially use this flaw to crash Pidgin or execute arbitrary code in the context of the pidgin process.

Vulnerable Configurations

Part Description Count
Application
Pidgin
61
OS
Debian
1
OS
Redhat
6

Common Weakness Enumeration (CWE)

Nessus

  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2017-1854.NASL
    descriptionFrom Red Hat Security Advisory 2017:1854 : An update for pidgin is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Pidgin is an instant messaging program which can log in to multiple accounts on multiple instant messaging networks simultaneously. The following packages have been upgraded to a later upstream version: pidgin (2.10.11). (BZ#1369526) Security Fix(es) : * A denial of service flaw was found in the way Pidgin
    last seen2020-06-01
    modified2020-06-02
    plugin id102283
    published2017-08-09
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/102283
    titleOracle Linux 7 : pidgin (ELSA-2017-1854)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Red Hat Security Advisory RHSA-2017:1854 and 
    # Oracle Linux Security Advisory ELSA-2017-1854 respectively.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(102283);
      script_version("3.7");
      script_cvs_date("Date: 2019/09/27 13:00:38");
    
      script_cve_id("CVE-2014-3694", "CVE-2014-3695", "CVE-2014-3696", "CVE-2014-3698", "CVE-2017-2640");
      script_xref(name:"RHSA", value:"2017:1854");
      script_xref(name:"IAVB", value:"2017-B-0029");
    
      script_name(english:"Oracle Linux 7 : pidgin (ELSA-2017-1854)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Oracle Linux host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "From Red Hat Security Advisory 2017:1854 :
    
    An update for pidgin is now available for Red Hat Enterprise Linux 7.
    
    Red Hat Product Security has rated this update as having a security
    impact of Moderate. A Common Vulnerability Scoring System (CVSS) base
    score, which gives a detailed severity rating, is available for each
    vulnerability from the CVE link(s) in the References section.
    
    Pidgin is an instant messaging program which can log in to multiple
    accounts on multiple instant messaging networks simultaneously.
    
    The following packages have been upgraded to a later upstream version:
    pidgin (2.10.11). (BZ#1369526)
    
    Security Fix(es) :
    
    * A denial of service flaw was found in the way Pidgin's Mxit plug-in
    handled emoticons. A malicious remote server or a man-in-the-middle
    attacker could potentially use this flaw to crash Pidgin by sending a
    specially crafted emoticon. (CVE-2014-3695)
    
    * A denial of service flaw was found in the way Pidgin parsed
    Groupwise server messages. A malicious remote server or a
    man-in-the-middle attacker could potentially use this flaw to cause
    Pidgin to consume an excessive amount of memory, possibly leading to a
    crash, by sending a specially crafted message. (CVE-2014-3696)
    
    * An information disclosure flaw was discovered in the way Pidgin
    parsed XMPP messages. A malicious remote server or a man-in-the-middle
    attacker could potentially use this flaw to disclose a portion of
    memory belonging to the Pidgin process by sending a specially crafted
    XMPP message. (CVE-2014-3698)
    
    * An out-of-bounds write flaw was found in the way Pidgin processed
    XML content. A malicious remote server could potentially use this flaw
    to crash Pidgin or execute arbitrary code in the context of the pidgin
    process. (CVE-2017-2640)
    
    * It was found that Pidgin's SSL/TLS plug-ins had a flaw in the
    certificate validation functionality. An attacker could use this flaw
    to create a fake certificate, that Pidgin would trust, which could be
    used to conduct man-in-the-middle attacks against Pidgin.
    (CVE-2014-3694)
    
    Red Hat would like to thank the Pidgin project for reporting these
    issues. Upstream acknowledges Yves Younan (Cisco Talos) and Richard
    Johnson (Cisco Talos) as the original reporters of CVE-2014-3695 and
    CVE-2014-3696; Thijs Alkemade and Paul Aurich as the original
    reporters of CVE-2014-3698; and Jacob Appelbaum and Moxie Marlinspike
    as the original reporters of CVE-2014-3694.
    
    Additional Changes :
    
    For detailed information on changes in this release, see the Red Hat
    Enterprise Linux 7.4 Release Notes linked from the References section."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://oss.oracle.com/pipermail/el-errata/2017-August/007075.html"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected pidgin packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:finch");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:finch-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:libpurple");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:libpurple-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:libpurple-perl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:libpurple-tcl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:pidgin");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:pidgin-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:pidgin-perl");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:linux:7");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2014/10/29");
      script_set_attribute(attribute:"patch_publication_date", value:"2017/08/08");
      script_set_attribute(attribute:"plugin_publication_date", value:"2017/08/09");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_set_attribute(attribute:"stig_severity", value:"I");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Oracle Linux Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/OracleLinux", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/OracleLinux")) audit(AUDIT_OS_NOT, "Oracle Linux");
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || !pregmatch(pattern: "Oracle (?:Linux Server|Enterprise Linux)", string:release)) audit(AUDIT_OS_NOT, "Oracle Linux");
    os_ver = pregmatch(pattern: "Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Oracle Linux");
    os_ver = os_ver[1];
    if (! preg(pattern:"^7([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Oracle Linux 7", "Oracle Linux " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Oracle Linux", cpu);
    if ("x86_64" >!< cpu) audit(AUDIT_ARCH_NOT, "x86_64", cpu);
    
    flag = 0;
    if (rpm_check(release:"EL7", cpu:"x86_64", reference:"finch-2.10.11-5.el7")) flag++;
    if (rpm_check(release:"EL7", cpu:"x86_64", reference:"finch-devel-2.10.11-5.el7")) flag++;
    if (rpm_check(release:"EL7", cpu:"x86_64", reference:"libpurple-2.10.11-5.el7")) flag++;
    if (rpm_check(release:"EL7", cpu:"x86_64", reference:"libpurple-devel-2.10.11-5.el7")) flag++;
    if (rpm_check(release:"EL7", cpu:"x86_64", reference:"libpurple-perl-2.10.11-5.el7")) flag++;
    if (rpm_check(release:"EL7", cpu:"x86_64", reference:"libpurple-tcl-2.10.11-5.el7")) flag++;
    if (rpm_check(release:"EL7", cpu:"x86_64", reference:"pidgin-2.10.11-5.el7")) flag++;
    if (rpm_check(release:"EL7", cpu:"x86_64", reference:"pidgin-devel-2.10.11-5.el7")) flag++;
    if (rpm_check(release:"EL7", cpu:"x86_64", reference:"pidgin-perl-2.10.11-5.el7")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "finch / finch-devel / libpurple / libpurple-devel / libpurple-perl / etc");
    }
    
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2017-457.NASL
    descriptionThis update for pidgin to version 2.12.0 fixes the following issues : This security issue was fixed : - CVE-2017-2640: Out of bounds memory read in purple_markup_unescape_entity (boo#1028835). These non-security issues were fixed : + libpurple : - Fix the use of uninitialised memory if running non-debug-enabled versions of glib. - Update AIM dev and dist ID
    last seen2020-06-05
    modified2017-04-12
    plugin id99295
    published2017-04-12
    reporterThis script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/99295
    titleopenSUSE Security Update : pidgin (openSUSE-2017-457)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from openSUSE Security Update openSUSE-2017-457.
    #
    # The text description of this plugin is (C) SUSE LLC.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(99295);
      script_version("3.4");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04");
    
      script_cve_id("CVE-2017-2640");
      script_xref(name:"IAVB", value:"2017-B-0029");
    
      script_name(english:"openSUSE Security Update : pidgin (openSUSE-2017-457)");
      script_summary(english:"Check for the openSUSE-2017-457 patch");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote openSUSE host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "This update for pidgin to version 2.12.0 fixes the following issues :
    
    This security issue was fixed :
    
      - CVE-2017-2640: Out of bounds memory read in
        purple_markup_unescape_entity (boo#1028835).
    
    These non-security issues were fixed :
    
      + libpurple :
    
      - Fix the use of uninitialised memory if running
        non-debug-enabled versions of glib.
    
      - Update AIM dev and dist ID's to new ones that were
        assigned by AOL.
    
      - TLS certificate verification now uses SHA-256 checksums.
    
      - Fix the SASL external auth for Freenode (boo#1009974).
    
      - Remove the MSN protocol plugin. It has been unusable and
        dormant for some time.
    
      - Remove the Mxit protocol plugin. The service was closed
        at the end ofSeptember 2016.
    
      - Remove the MySpaceIM protocol plugin. The service has
        been defunct for a long time (pidgin.im#15356).
    
      - Remove the Yahoo! protocol plugin. Yahoo has completely
        reimplemented their protocol, so this version is no
        longer operable as of August 5th, 2016.
    
      - Remove the Facebook (XMPP) account option. According to
        https://developers.facebook.com/docs/chat the XMPP Chat
        API service ended April 30th, 2015.
    
      - Fix gnutls certificate validation errors that mainly
        affected Google.
    
      + General :
    
      - Replace instances of d.pidgin.im with
        developer.pidgin.im and update the urls to use https
        (pidgin.im#17036).
    
      + IRC :
    
      - Fix an issue of messages being silently cut off at 500
        characters. Large messages are now split into parts and
        sent one by one (pidgin.im#4753)."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1009974"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1028835"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://developers.facebook.com/docs/chat"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected pidgin packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:finch");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:finch-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:finch-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libpurple");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libpurple-branding-openSUSE");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libpurple-branding-upstream");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libpurple-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libpurple-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libpurple-lang");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libpurple-plugin-sametime");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libpurple-plugin-sametime-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libpurple-tcl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libpurple-tcl-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:pidgin");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:pidgin-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:pidgin-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:pidgin-devel");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:42.2");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2017/04/11");
      script_set_attribute(attribute:"plugin_publication_date", value:"2017/04/12");
      script_set_attribute(attribute:"stig_severity", value:"I");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
    if (release !~ "^(SUSE42\.2)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "42.2", release);
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    ourarch = get_kb_item("Host/cpu");
    if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
    if (ourarch !~ "^(x86_64)$") audit(AUDIT_ARCH_NOT, "x86_64", ourarch);
    
    flag = 0;
    
    if ( rpm_check(release:"SUSE42.2", reference:"finch-2.12.0-8.6.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"finch-debuginfo-2.12.0-8.6.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"finch-devel-2.12.0-8.6.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libpurple-2.12.0-8.6.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libpurple-branding-openSUSE-42.2-3.3.2") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libpurple-branding-upstream-2.12.0-8.6.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libpurple-debuginfo-2.12.0-8.6.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libpurple-devel-2.12.0-8.6.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libpurple-lang-2.12.0-8.6.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libpurple-plugin-sametime-2.12.0-8.6.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libpurple-plugin-sametime-debuginfo-2.12.0-8.6.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libpurple-tcl-2.12.0-8.6.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"libpurple-tcl-debuginfo-2.12.0-8.6.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"pidgin-2.12.0-8.6.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"pidgin-debuginfo-2.12.0-8.6.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"pidgin-debugsource-2.12.0-8.6.1") ) flag++;
    if ( rpm_check(release:"SUSE42.2", reference:"pidgin-devel-2.12.0-8.6.1") ) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "libpurple-branding-openSUSE / finch / finch-debuginfo / finch-devel / etc");
    }
    
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2017-1165.NASL
    descriptionAccording to the versions of the pidgin package installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - A denial of service flaw was found in the way Pidgin
    last seen2020-05-06
    modified2017-09-08
    plugin id103003
    published2017-09-08
    reporterThis script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/103003
    titleEulerOS 2.0 SP1 : pidgin (EulerOS-SA-2017-1165)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(103003);
      script_version("3.13");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/05/04");
    
      script_cve_id(
        "CVE-2014-3694",
        "CVE-2014-3695",
        "CVE-2014-3696",
        "CVE-2014-3698",
        "CVE-2017-2640"
      );
      script_bugtraq_id(
        70701,
        70702,
        70703,
        70705
      );
    
      script_name(english:"EulerOS 2.0 SP1 : pidgin (EulerOS-SA-2017-1165)");
      script_summary(english:"Checks the rpm output for the updated packages.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote EulerOS host is missing multiple security updates.");
      script_set_attribute(attribute:"description", value:
    "According to the versions of the pidgin package installed, the
    EulerOS installation on the remote host is affected by the following
    vulnerabilities :
    
      - A denial of service flaw was found in the way Pidgin's
        Mxit plug-in handled emoticons. A malicious remote
        server or a man-in-the-middle attacker could
        potentially use this flaw to crash Pidgin by sending a
        specially crafted emoticon. (CVE-2014-3695)
    
      - A denial of service flaw was found in the way Pidgin
        parsed Groupwise server messages. A malicious remote
        server or a man-in-the-middle attacker could
        potentially use this flaw to cause Pidgin to consume an
        excessive amount of memory, possibly leading to a
        crash, by sending a specially crafted message.
        (CVE-2014-3696)
    
      - An information disclosure flaw was discovered in the
        way Pidgin parsed XMPP messages. A malicious remote
        server or a man-in-the-middle attacker could
        potentially use this flaw to disclose a portion of
        memory belonging to the Pidgin process by sending a
        specially crafted XMPP message. (CVE-2014-3698)
    
      - An out-of-bounds write flaw was found in the way Pidgin
        processed XML content. A malicious remote server could
        potentially use this flaw to crash Pidgin or execute
        arbitrary code in the context of the pidgin process.
        (CVE-2017-2640)
    
      - It was found that Pidgin's SSL/TLS plug-ins had a flaw
        in the certificate validation functionality. An
        attacker could use this flaw to create a fake
        certificate, that Pidgin would trust, which could be
        used to conduct man-in-the-middle attacks against
        Pidgin. (CVE-2014-3694)
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the EulerOS security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues.");
      # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2017-1165
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?88ff2809");
      script_set_attribute(attribute:"solution", value:
    "Update the affected pidgin packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2017/08/09");
      script_set_attribute(attribute:"plugin_publication_date", value:"2017/09/08");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libpurple");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:huawei:euleros:2.0");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Huawei Local Security Checks");
    
      script_copyright(english:"This script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/EulerOS/release", "Host/EulerOS/rpm-list", "Host/EulerOS/sp");
      script_exclude_keys("Host/EulerOS/uvp_version");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    
    release = get_kb_item("Host/EulerOS/release");
    if (isnull(release) || release !~ "^EulerOS") audit(AUDIT_OS_NOT, "EulerOS");
    if (release !~ "^EulerOS release 2\.0(\D|$)") audit(AUDIT_OS_NOT, "EulerOS 2.0");
    
    sp = get_kb_item("Host/EulerOS/sp");
    if (isnull(sp) || sp !~ "^(1)$") audit(AUDIT_OS_NOT, "EulerOS 2.0 SP1");
    
    uvp = get_kb_item("Host/EulerOS/uvp_version");
    if (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, "EulerOS 2.0 SP1", "EulerOS UVP " + uvp);
    
    if (!get_kb_item("Host/EulerOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "aarch64" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "EulerOS", cpu);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_ARCH_NOT, "i686 / x86_64", cpu);
    
    flag = 0;
    
    pkgs = ["libpurple-2.10.11-5"];
    
    foreach (pkg in pkgs)
      if (rpm_check(release:"EulerOS-2.0", sp:"1", reference:pkg)) flag++;
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_HOLE,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "pidgin");
    }
    
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-3231-1.NASL
    descriptionJoseph Bisch discovered that Pidgin incorrectly handled certain xml messages. A remote attacker could use this issue to cause Pidgin to crash, resulting in a denial of service, or possibly execute arbitrary code. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id97752
    published2017-03-15
    reporterUbuntu Security Notice (C) 2017-2019 Canonical, Inc. / NASL script (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/97752
    titleUbuntu 12.04 LTS / 14.04 LTS : pidgin vulnerability (USN-3231-1)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Ubuntu Security Notice USN-3231-1. The text 
    # itself is copyright (C) Canonical, Inc. See 
    # <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered 
    # trademark of Canonical, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(97752);
      script_version("3.10");
      script_cvs_date("Date: 2019/09/18 12:31:46");
    
      script_cve_id("CVE-2017-2640");
      script_xref(name:"USN", value:"3231-1");
      script_xref(name:"IAVB", value:"2017-B-0029");
    
      script_name(english:"Ubuntu 12.04 LTS / 14.04 LTS : pidgin vulnerability (USN-3231-1)");
      script_summary(english:"Checks dpkg output for updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Ubuntu host is missing a security-related patch."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Joseph Bisch discovered that Pidgin incorrectly handled certain xml
    messages. A remote attacker could use this issue to cause Pidgin to
    crash, resulting in a denial of service, or possibly execute arbitrary
    code.
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Ubuntu security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://usn.ubuntu.com/3231-1/"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected libpurple0 package."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libpurple0");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:12.04:-:lts");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:14.04");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2018/07/27");
      script_set_attribute(attribute:"patch_publication_date", value:"2017/03/14");
      script_set_attribute(attribute:"plugin_publication_date", value:"2017/03/15");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_set_attribute(attribute:"stig_severity", value:"I");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"Ubuntu Security Notice (C) 2017-2019 Canonical, Inc. / NASL script (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Ubuntu Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/cpu", "Host/Ubuntu", "Host/Ubuntu/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("ubuntu.inc");
    include("misc_func.inc");
    
    if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/Ubuntu/release");
    if ( isnull(release) ) audit(AUDIT_OS_NOT, "Ubuntu");
    release = chomp(release);
    if (! preg(pattern:"^(12\.04|14\.04)$", string:release)) audit(AUDIT_OS_NOT, "Ubuntu 12.04 / 14.04", "Ubuntu " + release);
    if ( ! get_kb_item("Host/Debian/dpkg-l") ) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Ubuntu", cpu);
    
    flag = 0;
    
    if (ubuntu_check(osver:"12.04", pkgname:"libpurple0", pkgver:"1:2.10.3-0ubuntu1.8")) flag++;
    if (ubuntu_check(osver:"14.04", pkgname:"libpurple0", pkgver:"1:2.10.9-0ubuntu3.4")) flag++;
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_HOLE,
        extra      : ubuntu_report_get()
      );
      exit(0);
    }
    else
    {
      tested = ubuntu_pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "libpurple0");
    }
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2017-1854.NASL
    descriptionAn update for pidgin is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Pidgin is an instant messaging program which can log in to multiple accounts on multiple instant messaging networks simultaneously. The following packages have been upgraded to a later upstream version: pidgin (2.10.11). (BZ#1369526) Security Fix(es) : * A denial of service flaw was found in the way Pidgin
    last seen2020-06-01
    modified2020-06-02
    plugin id102102
    published2017-08-02
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/102102
    titleRHEL 7 : pidgin (RHSA-2017:1854)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2017:1854. The text 
    # itself is copyright (C) Red Hat, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(102102);
      script_version("3.16");
      script_cvs_date("Date: 2019/10/24 15:35:43");
    
      script_cve_id("CVE-2014-3694", "CVE-2014-3695", "CVE-2014-3696", "CVE-2014-3698", "CVE-2017-2640");
      script_xref(name:"RHSA", value:"2017:1854");
    
      script_name(english:"RHEL 7 : pidgin (RHSA-2017:1854)");
      script_summary(english:"Checks the rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Red Hat host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "An update for pidgin is now available for Red Hat Enterprise Linux 7.
    
    Red Hat Product Security has rated this update as having a security
    impact of Moderate. A Common Vulnerability Scoring System (CVSS) base
    score, which gives a detailed severity rating, is available for each
    vulnerability from the CVE link(s) in the References section.
    
    Pidgin is an instant messaging program which can log in to multiple
    accounts on multiple instant messaging networks simultaneously.
    
    The following packages have been upgraded to a later upstream version:
    pidgin (2.10.11). (BZ#1369526)
    
    Security Fix(es) :
    
    * A denial of service flaw was found in the way Pidgin's Mxit plug-in
    handled emoticons. A malicious remote server or a man-in-the-middle
    attacker could potentially use this flaw to crash Pidgin by sending a
    specially crafted emoticon. (CVE-2014-3695)
    
    * A denial of service flaw was found in the way Pidgin parsed
    Groupwise server messages. A malicious remote server or a
    man-in-the-middle attacker could potentially use this flaw to cause
    Pidgin to consume an excessive amount of memory, possibly leading to a
    crash, by sending a specially crafted message. (CVE-2014-3696)
    
    * An information disclosure flaw was discovered in the way Pidgin
    parsed XMPP messages. A malicious remote server or a man-in-the-middle
    attacker could potentially use this flaw to disclose a portion of
    memory belonging to the Pidgin process by sending a specially crafted
    XMPP message. (CVE-2014-3698)
    
    * An out-of-bounds write flaw was found in the way Pidgin processed
    XML content. A malicious remote server could potentially use this flaw
    to crash Pidgin or execute arbitrary code in the context of the pidgin
    process. (CVE-2017-2640)
    
    * It was found that Pidgin's SSL/TLS plug-ins had a flaw in the
    certificate validation functionality. An attacker could use this flaw
    to create a fake certificate, that Pidgin would trust, which could be
    used to conduct man-in-the-middle attacks against Pidgin.
    (CVE-2014-3694)
    
    Red Hat would like to thank the Pidgin project for reporting these
    issues. Upstream acknowledges Yves Younan (Cisco Talos) and Richard
    Johnson (Cisco Talos) as the original reporters of CVE-2014-3695 and
    CVE-2014-3696; Thijs Alkemade and Paul Aurich as the original
    reporters of CVE-2014-3698; and Jacob Appelbaum and Moxie Marlinspike
    as the original reporters of CVE-2014-3694.
    
    Additional Changes :
    
    For detailed information on changes in this release, see the Red Hat
    Enterprise Linux 7.4 Release Notes linked from the References section."
      );
      # https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?3395ff0b"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/errata/RHSA-2017:1854"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2014-3694"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2014-3695"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2014-3696"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2014-3698"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2017-2640"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:finch");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:finch-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:libpurple");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:libpurple-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:libpurple-perl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:libpurple-tcl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:pidgin");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:pidgin-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:pidgin-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:pidgin-perl");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7.4");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7.5");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7.6");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7.7");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2014/10/29");
      script_set_attribute(attribute:"patch_publication_date", value:"2017/08/01");
      script_set_attribute(attribute:"plugin_publication_date", value:"2017/08/02");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Red Hat Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
    os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
    os_ver = os_ver[1];
    if (! preg(pattern:"^7([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 7.x", "Red Hat " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
    
    yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
    if (!empty_or_null(yum_updateinfo)) 
    {
      rhsa = "RHSA-2017:1854";
      yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
      if (!empty_or_null(yum_report))
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_HOLE,
          extra      : yum_report 
        );
        exit(0);
      }
      else
      {
        audit_message = "affected by Red Hat security advisory " + rhsa;
        audit(AUDIT_OS_NOT, audit_message);
      }
    }
    else
    {
      flag = 0;
      if (rpm_check(release:"RHEL7", reference:"finch-2.10.11-5.el7")) flag++;
    
      if (rpm_check(release:"RHEL7", reference:"finch-devel-2.10.11-5.el7")) flag++;
    
      if (rpm_check(release:"RHEL7", reference:"libpurple-2.10.11-5.el7")) flag++;
    
      if (rpm_check(release:"RHEL7", reference:"libpurple-devel-2.10.11-5.el7")) flag++;
    
      if (rpm_check(release:"RHEL7", cpu:"s390x", reference:"libpurple-perl-2.10.11-5.el7")) flag++;
    
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"libpurple-perl-2.10.11-5.el7")) flag++;
    
      if (rpm_check(release:"RHEL7", cpu:"s390x", reference:"libpurple-tcl-2.10.11-5.el7")) flag++;
    
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"libpurple-tcl-2.10.11-5.el7")) flag++;
    
      if (rpm_check(release:"RHEL7", cpu:"s390x", reference:"pidgin-2.10.11-5.el7")) flag++;
    
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"pidgin-2.10.11-5.el7")) flag++;
    
      if (rpm_check(release:"RHEL7", reference:"pidgin-debuginfo-2.10.11-5.el7")) flag++;
    
      if (rpm_check(release:"RHEL7", reference:"pidgin-devel-2.10.11-5.el7")) flag++;
    
      if (rpm_check(release:"RHEL7", cpu:"s390x", reference:"pidgin-perl-2.10.11-5.el7")) flag++;
    
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"pidgin-perl-2.10.11-5.el7")) flag++;
    
    
      if (flag)
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_HOLE,
          extra      : rpm_report_get() + redhat_report_package_caveat()
        );
        exit(0);
      }
      else
      {
        tested = pkg_tests_get();
        if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
        else audit(AUDIT_PACKAGE_NOT_INSTALLED, "finch / finch-devel / libpurple / libpurple-devel / libpurple-perl / etc");
      }
    }
    
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2017-431.NASL
    descriptionThis update for pidgin fixes the following issues : Feature update : - Update to GNOME 3.20.2 (fate#318572). Security issues fixed : - CVE-2017-2640: Fix an out of bounds memory read in purple_markup_unescape_entity. (boo#1028835) - CVE-2014-3698: remote information leak via crafted XMPP message (boo#902408). - CVE-2014-3696: denial of service parsing Groupwise server message (boo#902410). - CVE-2014-3695: crash in MXit protocol plug-in (boo#902409). Bugfixes - Correctly remove *.so files for plugins (fixes devel-file-in-non-devel-package). - Remove generation of a plugin list to package, simply add it all in %files with exclusions. - Build with GStreamer 1.x on SLE 12 SP2. - Fix SASL EXTERNAL fingerprint authentication (boo#1009974). - Use ALSA as default for avoiding broken volume control of pa sink (boo#886670).
    last seen2020-06-05
    modified2017-04-05
    plugin id99194
    published2017-04-05
    reporterThis script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/99194
    titleopenSUSE Security Update : pidgin (openSUSE-2017-431)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DLA-853.NASL
    descriptionIt was discovered that an invalid XML file can trigger an out-of-bound memory access in Pidgin, a multi-protocol instant messaging client, when it is sent by a malicious server. This might lead to a crash or, in some extreme cases, to remote code execution in the client-side. For Debian 7
    last seen2020-03-17
    modified2017-03-13
    plugin id97669
    published2017-03-13
    reporterThis script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/97669
    titleDebian DLA-853-1 : pidgin security update
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20170801_PIDGIN_ON_SL7_X.NASL
    descriptionThe following packages have been upgraded to a later upstream version: pidgin (2.10.11). Security Fix(es) : - A denial of service flaw was found in the way Pidgin
    last seen2020-03-18
    modified2017-08-22
    plugin id102651
    published2017-08-22
    reporterThis script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/102651
    titleScientific Linux Security Update : pidgin on SL7.x x86_64 (20170801)
  • NASL familySlackware Local Security Checks
    NASL idSLACKWARE_SSA_2017-074-01.NASL
    descriptionNew pidgin packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, 14.2, and -current to fix a security issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id97755
    published2017-03-16
    reporterThis script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/97755
    titleSlackware 13.0 / 13.1 / 13.37 / 14.0 / 14.1 / 14.2 / current : pidgin (SSA:2017-074-01)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2017-1166.NASL
    descriptionAccording to the versions of the pidgin package installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - A denial of service flaw was found in the way Pidgin
    last seen2020-05-06
    modified2017-09-08
    plugin id103004
    published2017-09-08
    reporterThis script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/103004
    titleEulerOS 2.0 SP2 : pidgin (EulerOS-SA-2017-1166)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2017-410.NASL
    descriptionThis update for pidgin fixes the following issues : Feature update : - Update to GNOME 3.20.2 (fate#318572). Security issues fixed : - CVE-2017-2640: Fix an out of bounds memory read in purple_markup_unescape_entity. (boo#1028835) Bugfixes - Correctly remove *.so files for plugins (fixes devel-file-in-non-devel-package). - Remove generation of a plugin list to package, simply add it all in %files with exclusions. - Fix SASL EXTERNAL fingerprint authentication (boo#1009974).
    last seen2020-06-05
    modified2017-04-03
    plugin id99151
    published2017-04-03
    reporterThis script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/99151
    titleopenSUSE Security Update : pidgin (openSUSE-2017-410)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2017-1854.NASL
    descriptionAn update for pidgin is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Pidgin is an instant messaging program which can log in to multiple accounts on multiple instant messaging networks simultaneously. The following packages have been upgraded to a later upstream version: pidgin (2.10.11). (BZ#1369526) Security Fix(es) : * A denial of service flaw was found in the way Pidgin
    last seen2020-06-01
    modified2020-06-02
    plugin id102736
    published2017-08-25
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/102736
    titleCentOS 7 : pidgin (CESA-2017:1854)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-3806.NASL
    descriptionIt was discovered a vulnerability in Pidgin, a multi-protocol instant messaging client. A server controlled by an attacker can send an invalid XML that can trigger an out-of-bound memory access. This might lead to a crash or, in some extreme cases, to remote code execution in the client-side.
    last seen2020-06-01
    modified2020-06-02
    plugin id97644
    published2017-03-10
    reporterThis script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/97644
    titleDebian DSA-3806-1 : pidgin - security update
  • NASL familyWindows
    NASL idPIDGIN_2_12_0.NASL
    descriptionThe version of Pidgin installed on the remote Windows host is prior to 2.12.0. It is, therefore, affected by a remote code execution vulnerability in the libpurple library in util.c due to an out-of-bounds writer error in the purple_markup_unescape_entity() function that is triggered when handling invalid XML entities separated by whitespaces. An unauthenticated, remote attacker can exploit this, via a malicious server, to execute arbitrary code.
    last seen2020-06-01
    modified2020-06-02
    plugin id97947
    published2017-03-24
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/97947
    titlePidgin < 2.12.0 libpurple/util.c purple_markup_unescape_entity() XML Entity Handling RCE
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201706-10.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201706-10 (Pidgin: Arbitrary code execution) Joseph Bisch discovered that Pidgin incorrectly handled certain xml messages. Impact : A remote attacker could send a specially crafted instant message, possibly resulting in execution of arbitrary code with the privileges of the Pidgin process. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id100653
    published2017-06-07
    reporterThis script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/100653
    titleGLSA-201706-10 : Pidgin: Arbitrary code execution

Redhat

advisories
bugzilla
id1446368
titleSilence -Wsign-compare
oval
OR
  • commentRed Hat Enterprise Linux must be installed
    ovaloval:com.redhat.rhba:tst:20070304026
  • AND
    • commentRed Hat Enterprise Linux 7 is installed
      ovaloval:com.redhat.rhba:tst:20150364027
    • OR
      • AND
        • commentfinch-devel is earlier than 0:2.10.11-5.el7
          ovaloval:com.redhat.rhsa:tst:20171854001
        • commentfinch-devel is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20192044046
      • AND
        • commentlibpurple-devel is earlier than 0:2.10.11-5.el7
          ovaloval:com.redhat.rhsa:tst:20171854003
        • commentlibpurple-devel is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20192044042
      • AND
        • commentlibpurple-tcl is earlier than 0:2.10.11-5.el7
          ovaloval:com.redhat.rhsa:tst:20171854005
        • commentlibpurple-tcl is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20192044038
      • AND
        • commentpidgin-devel is earlier than 0:2.10.11-5.el7
          ovaloval:com.redhat.rhsa:tst:20171854007
        • commentpidgin-devel is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20192044034
      • AND
        • commentlibpurple-perl is earlier than 0:2.10.11-5.el7
          ovaloval:com.redhat.rhsa:tst:20171854009
        • commentlibpurple-perl is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20192044036
      • AND
        • commentpidgin-perl is earlier than 0:2.10.11-5.el7
          ovaloval:com.redhat.rhsa:tst:20171854011
        • commentpidgin-perl is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20192044048
      • AND
        • commentfinch is earlier than 0:2.10.11-5.el7
          ovaloval:com.redhat.rhsa:tst:20171854013
        • commentfinch is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20192044032
      • AND
        • commentlibpurple is earlier than 0:2.10.11-5.el7
          ovaloval:com.redhat.rhsa:tst:20171854015
        • commentlibpurple is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20192044040
      • AND
        • commentpidgin is earlier than 0:2.10.11-5.el7
          ovaloval:com.redhat.rhsa:tst:20171854017
        • commentpidgin is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20192044044
rhsa
idRHSA-2017:1854
released2017-08-01
severityModerate
titleRHSA-2017:1854: pidgin security, bug fix, and enhancement update (Moderate)
rpms
  • finch-0:2.10.11-5.el7
  • finch-devel-0:2.10.11-5.el7
  • libpurple-0:2.10.11-5.el7
  • libpurple-devel-0:2.10.11-5.el7
  • libpurple-perl-0:2.10.11-5.el7
  • libpurple-tcl-0:2.10.11-5.el7
  • pidgin-0:2.10.11-5.el7
  • pidgin-debuginfo-0:2.10.11-5.el7
  • pidgin-devel-0:2.10.11-5.el7
  • pidgin-perl-0:2.10.11-5.el7