[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2010:001 -- Mandriva pidgin

ID: oval:org.secpod.oval:def:300352Date: (C)2012-01-07   (M)2024-01-29
Class: PATCHFamily: unix




Security vulnerabilities has been identified and fixed in pidgin: The OSCAR protocol plugin in libpurple in Pidgin before 2.6.3 and Adium before 1.3.7 allows remote attackers to cause a denial of service via crafted contact-list data for ICQ and possibly AIM, as demonstrated by the SIM IM client . Directory traversal vulnerability in slp.c in the MSN protocol plugin in libpurple in Pidgin 2.6.4 and Adium 1.3.8 allows remote attackers to read arbitrary files via a .. in an application/x-msnmsgrp2p MSN emoticon request, a related issue to CVE-2004-0122. NOTE: it could be argued that this is resultant from a vulnerability in which an emoticon download request is processed even without a preceding text/x-mms-emoticon message that announced availability of the emoticon . Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers. This update provides pidgin 2.6.5, which is not vulnerable to these issues.

Platform:
Mandriva Linux 2009.1
Mandriva Linux 2008.0
Product:
pidgin
Reference:
MDVSA-2010:001
CVE-2010-0013
CVE-2009-3615
CVE    2
CVE-2009-3615
CVE-2010-0013
CPE    2
cpe:/o:mandriva:linux:2008.0
cpe:/o:mandriva:linux:2009.1

© SecPod Technologies