Summary: | <net-im/pidgin-2.6.5: msn arbitrary file retrieval (CVE-2010-0013) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | cnu <bshalm> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | net-im |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | All | ||
URL: | http://developer.pidgin.im/viewmtn/revision/diff/3d02401cf232459fc80c0837d31e05fae7ae5467/with/c64a1adc8bda2b4aeaae1f273541afbc4f71b810/libpurple/protocols/msn/slp.c | ||
Whiteboard: | B3 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
cnu
2010-01-05 13:21:55 UTC
2.6.4 does not have the fix, there is no new release yet. Patch in $URL, please provide a patched ebuild. 2.6.5 was released yesterday with a fix - might be an idea to bump pronto. Version 2.6.5 fixes the problem, please stabilize x86 stable Stable for HPPA. BTW, note that 2.6.5 seems to have regression: http://developer.pidgin.im/ticket/11142 Stable on alpha. (In reply to comment #6) > BTW, note that 2.6.5 seems to have regression: > http://developer.pidgin.im/ticket/11142 Well, actually this was not regression and this had something to do with changes on ICQ servers. Currently it looks like changes were reverted and everything should just work. ppc stable amd64 stable, all arches done. GLSA vote: yes. YES too, request filed. CVE-2010-0013 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0013): Directory traversal vulnerability in slp.c in the MSN protocol plugin in libpurple in Pidgin 2.6.4 and Adium 1.3.8 allows remote attackers to read arbitrary files via a .. (dot dot) in an application/x-msnmsgrp2p MSN emoticon (aka custom smiley) request, a related issue to CVE-2004-0122. NOTE: it could be argued that this is resultant from a vulnerability in which an emoticon download request is processed even without a preceding text/x-mms-emoticon message that announced availability of the emoticon. This issue was resolved and addressed in GLSA 201206-11 at http://security.gentoo.org/glsa/glsa-201206-11.xml by GLSA coordinator Stefan Behte (craig). |