Mehrere Probleme in Pidgin
ID: | USN-1500-1 |
Distribution: | Ubuntu |
Plattformen: | Ubuntu 10.04 LTS, Ubuntu 11.04, Ubuntu 11.10, Ubuntu 12.04 LTS |
Datum: | Di, 10. Juli 2012, 10:34 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4601
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4602 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4603 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4922 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4939 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1178 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2214 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2318 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3374 |
Applikationen: | Pidgin |
Originalnachricht |
|
--===============5329260514136628061== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="xo44VMWPx7vlQ2+2" Content-Disposition: inline --xo44VMWPx7vlQ2+2 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inlin Content-Transfer-Encoding: quoted-printable ========================================================================== Ubuntu Security Notice USN-1500-1 July 09, 2012 pidgin vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.04 LTS - Ubuntu 11.10 - Ubuntu 11.04 - Ubuntu 10.04 LTS Summary: Several security issues were fixed in Pidgin. Software Description: - pidgin: graphical multi-protocol instant messaging client for X Details: Evgeny Boger discovered that Pidgin incorrectly handled buddy list messages in the AIM and ICQ protocol handlers. A remote attacker could send a specially crafted message and cause Pidgin to crash, leading to a denial of service. This issue only affected Ubuntu 10.04 LTS, 11.04 and 11.10. (CVE-2011-4601) Thijs Alkemade discovered that Pidgin incorrectly handled malformed voice and video chat requests in the XMPP protocol handler. A remote attacker could send a specially crafted message and cause Pidgin to crash, leading to a denial of service. This issue only affected Ubuntu 10.04 LTS, 11.04 and 11.10. (CVE-2011-4602) Diego Bauche Madero discovered that Pidgin incorrectly handled UTF-8 sequences in the SILC protocol handler. A remote attacker could send a specially crafted message and cause Pidgin to crash, leading to a denial of service. This issue only affected Ubuntu 10.04 LTS, 11.04 and 11.10. (CVE-2011-4603) Julia Lawall discovered that Pidgin incorrectly cleared memory contents used in cryptographic operations. An attacker could exploit this to read the memory contents, leading to an information disclosure. This issue only affected Ubuntu 10.04 LTS. (CVE-2011-4922) Clemens Huebner and Kevin Stange discovered that Pidgin incorrectly handled nickname changes inside chat rooms in the XMPP protocol handler. A remote attacker could exploit this by changing nicknames, leading to a denial of service. This issue only affected Ubuntu 11.10. (CVE-2011-4939) Thijs Alkemade discovered that Pidgin incorrectly handled off-line instant messages in the MSN protocol handler. A remote attacker could send a specially crafted message and cause Pidgin to crash, leading to a denial of service. This issue only affected Ubuntu 10.04 LTS, 11.04 and 11.10. (CVE-2012-1178) José Valentín Gutiérrez discovered that Pidgin incorrectly handled SOCKS5 proxy connections during file transfer requests in the XMPP protocol handler. A remote attacker could send a specially crafted request and cause Pidgin to crash, leading to a denial of service. This issue only affected Ubuntu 12.04 LTS and 11.10. (CVE-2012-2214) Fabian Yamaguchi discovered that Pidgin incorrectly handled malformed messages in the MSN protocol handler. A remote attacker could send a specially crafted message and cause Pidgin to crash, leading to a denial of service. (CVE-2012-2318) Ulf Härnhammar discovered that Pidgin incorrectly handled messages with in-line images in the MXit protocol handler. A remote attacker could send a specially crafted message and possibly execute arbitrary code with user privileges. (CVE-2012-3374) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.04 LTS: finch 1:2.10.3-0ubuntu1.1 libpurple0 1:2.10.3-0ubuntu1.1 pidgin 1:2.10.3-0ubuntu1.1 Ubuntu 11.10: finch 1:2.10.0-0ubuntu2.1 libpurple0 1:2.10.0-0ubuntu2.1 pidgin 1:2.10.0-0ubuntu2.1 Ubuntu 11.04: finch 1:2.7.11-1ubuntu2.2 libpurple0 1:2.7.11-1ubuntu2.2 pidgin 1:2.7.11-1ubuntu2.2 Ubuntu 10.04 LTS: finch 1:2.6.6-1ubuntu4.5 libpurple0 1:2.6.6-1ubuntu4.5 pidgin 1:2.6.6-1ubuntu4.5 After a standard system update you need to restart Pidgin to make all the necessary changes. References: http://www.ubuntu.com/usn/usn-1500-1 CVE-2011-4601, CVE-2011-4602, CVE-2011-4603, CVE-2011-4922, CVE-2011-4939, CVE-2012-1178, CVE-2012-2214, CVE-2012-2318, CVE-2012-3374 Package Information: https://launchpad.net/ubuntu/+source/pidgin/1:2.10.3-0ubuntu1.1 https://launchpad.net/ubuntu/+source/pidgin/1:2.10.0-0ubuntu2.1 https://launchpad.net/ubuntu/+source/pidgin/1:2.7.11-1ubuntu2.2 https://launchpad.net/ubuntu/+source/pidgin/1:2.6.6-1ubuntu4.5 --xo44VMWPx7vlQ2+2 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iQIcBAEBCgAGBQJP+zsAAAoJENaSAD2qAscKaaQQAMBlMgA9Ya/vQuaE36ytAMDh hLMT9mF0O8oWSFVKI1pBblSuE3MBPyjaVgp8fjrig32jfthrAHxdvkEDiRkkR4Ms r214hSi28nojkpCP8uRWDZCoQLoQF+QGF6kv/Hzw5Ci5wqwrnOf/dcP53az7Pu3c JzWxG7hymE9PlZSO0/s8nmWV2H+mLiJhLq1860qcdWRUQ74Icx9rnktrqZ02SVi0 JDk0oKkkVT7tyrdNh2eCEc3zg1P5ZQSTMQzl7vvpdh4QsUH5N2cvcK/sdjqcTYgO rkF6G33hDlKE/6d4NhNb9TlkwnN+j2jTn+EBBzJz2JOqxy7rzPkKdATlV9VSdfsJ V/LMwo0Gjtjz5qwc5SffX+9Yko97ni8y/szCmamM8zioCo/ZzpM44i6HEUYlIqlN OpJo2Bx8RcHoPyVtxfgVCBeNyzu2DoVHM+5Nn5WFdlozEg6KT60/wGL5aoIOKQum baVsTWpYjscIG7D2XcLSwEssCoZjHg1kSBEgtpQlno5RDmiCEZLPgFbeZdS+iukY 53gfTN4T1EnZRfuc+UXxJa5uw4GRK8hOeatOmJCNej/JuT1ywkJxwG/MQpO9cxqr fNgb2HKlyLPoEA+oXIPnFjy3dFFeMU0pAsJt4Uht/GtMF5Hz/jhZDrGtbpxe2Hm6 lnj/RKOoN1dOtRot65yo =q9SB -----END PGP SIGNATURE----- --xo44VMWPx7vlQ2+2-- --===============5329260514136628061== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce --===============5329260514136628061==-- |