Lucene search

K
kasperskyKaspersky LabKLA10932
HistoryJun 21, 2016 - 12:00 a.m.

KLA10932 Multiple vulnerabilities in Pidgin

2016-06-2100:00:00
Kaspersky Lab
threats.kaspersky.com
27

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

7.4 High

AI Score

Confidence

Low

0.005 Low

EPSS

Percentile

77.1%

Multiple serious vulnerabilities have been found in Pidgin. Malicious users can exploit these vulnerabilities to overwrite arbitrary files, cause denial of service, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. A directory traversal vulnerability in the handling of MXIT protocol can be exploited remotely via specially designed MXIT data sent from the server to overwrite arbitrary files;
  2. An out-of-bounds read vulnerability can be exploited remotely via specialy designed MXIT data (a particular string) possibly to obtain sensitive information;
  3. A buffer overflow vulnerability in the handling of MXIT protocol can be exploited remotely via specially designed data possibly to cause a denial of service.

Technical details

Vulnerability (1) occurs if liburple is triggered by man-in-the-middle or a malicious server to overwrite local files. The name and and content of these files can be specified by the remote attacker.

To trigger vulnerability (3) a malicious server or man-in-the-middle can send negative length values.

Original advisories

Pidgin Security Advisory

Related products

Pidgin

CVE list

CVE-2016-2380 warning

CVE-2016-2378 high

CVE-2016-4323 high

Solution

Update to the latest version

Download Pidgin

Impacts

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • OAF

Overwrite arbitrary files. Exploitation of vulnerabilities with this impact can lead to loss of some information, contained in overwritten files.

Affected Products

  • Pidgin versions earlier than 2.11.0

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

7.4 High

AI Score

Confidence

Low

0.005 Low

EPSS

Percentile

77.1%