[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2013:025 -- Mandriva pidgin

ID: oval:org.secpod.oval:def:1300170Date: (C)2013-03-22   (M)2022-10-10
Class: PATCHFamily: unix




Multiple vulnerabilities has been discovered and corrected in pidgin: The MXit protocol plugin in libpurple in Pidgin before 2.10.7 might allow remote attackers to create or overwrite files via a crafted mxit or mxit/imagestrips pathname . Buffer overflow in http.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.7 allows remote servers to execute arbitrary code via a long HTTP header . sametime.c in the Sametime protocol plugin in libpurple in Pidgin before 2.10.7 does not properly terminate long user IDs, which allows remote servers to cause a denial of service via a crafted packet . upnp.c in libpurple in Pidgin before 2.10.7 does not properly terminate long strings in UPnP responses, which allows remote attackers to cause a denial of service by leveraging access to the local network . This update provides pidgin 2.10.7, which is not vulnerable to these issues.

Platform:
Mandriva Enterprise Server 5.2
Product:
pidgin
Reference:
MDVSA-2013:025
CVE-2013-0271
CVE-2013-0272
CVE-2013-0273
CVE-2013-0274
CVE    4
CVE-2013-0273
CVE-2013-0274
CVE-2013-0271
CVE-2013-0272
...
CPE    1
cpe:/o:mandriva:enterprise_server:5.2

© SecPod Technologies