Security Vulnerabilities in Pidgin 2.5.5

Bug #382644 reported by Noam Rathaus
260
This bug affects 1 person
Affects Status Importance Assigned to Milestone
pidgin (Ubuntu)
Fix Released
Undecided
Unassigned

Bug Description

Binary package hint: pidgin

Multiple issues affecting Pidgin 2.5.5

See:
http://www.pidgin.im/news/security/?id=29
http://www.pidgin.im/news/security/?id=30
http://www.pidgin.im/news/security/?id=31
http://www.pidgin.im/news/security/?id=32

Basically:
The remote host is running Pidgin earlier than 2.5.6. Such versions are reportedly affected by multiple buffer overflow vulnerabilities:

  - A buffer overflow is possible when initiating a file transfer to a malicious buddy over XMPP. (CVE-2009-1373)

  - A buffer overflow issue in the 'decrypt_out()' function can be exploited through specially crafted 'QQ' packets.(CVE-2009-1374)

  - A buffer maintained by PurpleCircBuffer which is used by XMPP and Sametime protocol plugins can be corrupted if
    it's exactly full and then more bytes are added to it. (CVE-2009-1375)

  - An integer-overflow issue exists in the application due to an incorrect typecasting of 'int64' to 'size_t'. (CVE-2009-1376)

Revision history for this message
Marc Deslauriers (mdeslaur) wrote :

This was fixed today in the following USNs:

http://www.ubuntu.com/usn/USN-781-1
http://www.ubuntu.com/usn/USN-781-2

For Karmic, there is a merge request in bug #380806.

visibility: private → public
Changed in pidgin (Ubuntu):
status: New → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.