CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
92.1%
Debian Security Advisory DSA-2859-1 [email protected]
http://www.debian.org/security/ Moritz Muehlenhoff
February 10, 2014 http://www.debian.org/security/faq
Package : pidgin
Vulnerability : several
CVE ID : CVE-2013-6477 CVE-2013-6478 CVE-2013-6479 CVE-2013-6481
CVE-2013-6482 CVE-2013-6483 CVE-2013-6484 CVE-2013-6485
CVE-2013-6487 CVE-2013-6489 CVE-2013-6490 CVE-2014-0020
Multiple vulnerabilities have been discovered in Pidgin, a multi-protocol
instant messaging client:
CVE-2013-6477
Jaime Breva Ribes discovered that a remote XMPP user can trigger a
crash by sending a message with a timestamp in the distant future.
CVE-2013-6478
Pidgin could be crashed through overly wide tooltip windows.
CVE-2013-6479
Jacob Appelbaum discovered that a malicious server or a "man in the
middle" could send a malformed HTTP header resulting in denial of
service.
CVE-2013-6481
Daniel Atallah discovered that Pidgin could be crashed through
malformed Yahoo! P2P messages.
CVE-2013-6482
Fabian Yamaguchi and Christian Wressnegger discovered that Pidgin
could be crashed through malformed MSN messages.
CVE-2013-6483
Fabian Yamaguchi and Christian Wressnegger discovered that Pidgin
could be crashed through malformed XMPP messages.
CVE-2013-6484
It was discovered that incorrect error handling when reading the
response from a STUN server could result in a crash.
CVE-2013-6485
Matt Jones discovered a buffer overflow in the parsing of malformed
HTTP responses.
CVE-2013-6487
Yves Younan and Ryan Pentney discovered a buffer overflow when parsing
Gadu-Gadu messages.
CVE-2013-6489
Yves Younan and Pawel Janic discovered an integer overflow when parsing
MXit emoticons.
CVE-2013-6490
Yves Younan discovered a buffer overflow when parsing SIMPLE headers.
CVE-2014-0020
Daniel Atallah discovered that Pidgin could be crashed via malformed
IRC arguments.
For the oldstable distribution (squeeze), no direct backport is provided.
A fixed packages will be provided through backports.debian.org shortly
For the stable distribution (wheezy), these problems have been fixed in
version 2.10.9-1~deb7u1.
For the unstable distribution (sid), these problems have been fixed in
version 2.10.9-1.
We recommend that you upgrade your pidgin packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 6 | kfreebsd-amd64 | pidgin-dbg | < 2.7.3-1+squeeze4 | pidgin-dbg_2.7.3-1+squeeze4_kfreebsd-amd64.deb |
Debian | 7 | s390x | libpurple0 | < 2.10.9-1~deb7u1 | libpurple0_2.10.9-1~deb7u1_s390x.deb |
Debian | 6 | amd64 | finch | < 2.7.3-1+squeeze4 | finch_2.7.3-1+squeeze4_amd64.deb |
Debian | 6 | sparc | libpurple0 | < 2.7.3-1+squeeze4 | libpurple0_2.7.3-1+squeeze4_sparc.deb |
Debian | 7 | amd64 | libgadu3 | < 1:1.11.2-1+deb7u1 | libgadu3_1:1.11.2-1+deb7u1_amd64.deb |
Debian | 6 | mipsel | pidgin-dbg | < 2.7.3-1+squeeze4 | pidgin-dbg_2.7.3-1+squeeze4_mipsel.deb |
Debian | 6 | s390 | libgadu3 | < 1:1.9.0-2+squeeze2 | libgadu3_1:1.9.0-2+squeeze2_s390.deb |
Debian | 7 | kfreebsd-i386 | pidgin | < 2.10.9-1~deb7u1 | pidgin_2.10.9-1~deb7u1_kfreebsd-i386.deb |
Debian | 6 | ia64 | pidgin | < 2.7.3-1+squeeze4 | pidgin_2.7.3-1+squeeze4_ia64.deb |
Debian | 7 | armhf | pidgin-dbg | < 2.10.9-1~deb7u1 | pidgin-dbg_2.10.9-1~deb7u1_armhf.deb |