www: 3639d149: Updates to security news page.
datallah at pidgin.im
datallah at pidgin.im
Wed Aug 27 12:20:28 EDT 2008
-----------------------------------------------------------------
Revision: 3639d149c6be3450f9511253ecd85a7c276ee24a
Ancestor: db773c19becaa07f3f0219702ed2f5e4014fe383
Author: datallah at pidgin.im
Date: 2008-08-27T16:17:50
Branch: im.pidgin.www
URL: http://d.pidgin.im/viewmtn/revision/info/3639d149c6be3450f9511253ecd85a7c276ee24a
Modified files:
htdocs/news/security/index.php
ChangeLog:
Updates to security news page.
-------------- next part --------------
============================================================
--- htdocs/news/security/index.php 769d914afbfbcf899eaab373308a8d121cf775ff
+++ htdocs/news/security/index.php 3fd71b3f495df860a09fdb2d900b281f13ae2066
@@ -266,6 +266,46 @@ $vulnerabilities = array(
"fix" => "The affected function has been patched to fix the vulnerability.",
"fixedversion" => "2.2.2",
"discoveredby" => "Jeffrey Rosen"
+ ),
+ array(
+ "title" => "MSN malformed SLP message overflow",
+ "date" => "July 2008",
+ "cve" => "CVE-2008-2927",
+ "summary" => "Malformed SLP messages can cause a buffer overflow",
+ "description" => "Multiple integer overflows in the msn_slplink_process_msg functions in the MSN protocol handler in libpurple allow remote attackers to execute arbitrary code via a malformed SLP message.",
+ "fix" => "The affected function has been patched to fix the vulnerability.",
+ "fixedversion" => "2.4.3",
+ "discoveredby" => "Anonymous (via TippingPoint's Zero Day Initiative)"
+ ),
+ array(
+ "title" => "MSN Remote file transfer filename DoS",
+ "date" => "25 June 2008",
+ "cve" => "CVE-2008-2955",
+ "summary" => "MSN file transfers with specially crafted file names can cause libpurple to crash",
+ "description" => "A remote MSN user can cause a denial of service (crash) by sending a file with a file with a filename containing invalid characters. The local user must then accept the file transfer to trigger a double-free.",
+ "fix" => "A fix was applied to ensure that the double-free didn't occur.",
+ "fixedversion" => "2.4.3",
+ "discoveredby" => "Juan Pablo Lopez Yacubian"
+ ),
+ array(
+ "title" => "Remote UPnP discovery DoS",
+ "date" => "11 May 2007",
+ "cve" => "CVE-2008-2957",
+ "summary" => "A malicious process could pose as a UPnP server and cause libpurple to download excessive data.",
+ "description" => "The UPnP functionality in libpurple allows remote attackers to trigger the download of arbitrary files and cause a denial of service (memory or disk consumption) via a UDP packet that specifies an arbitrary URL.",
+ "fix" => "UPnP related downloads are limited to 128kB",
+ "fixedversion" => "2.5.0",
+ "discoveredby" => "Andrew Hunt and Christian Grothoff"
+ ),
+ array(
+ "title" => "NSS TLS/SSL Certificates not validated",
+ "date" => "25 July 2008",
+ "cve" => "CVE-2008-3532",
+ "summary" => "No validation on SSL certificates was performed for NSS SSL",
+ "description" => "The NSS SSL implementation in libpurple does not verify SSL certificates, which makes it easier for remote attackers to trick a user into accepting an invalid server certificate for a spoofed service.",
+ "fix" => "SSL/TLS Certificates are now verified in the NSS implementation in libpurple.",
+ "fixedversion" => "2.5.0",
+ "discoveredby" => "Josh Triplett"
)
);
/* Template for the unfortunate future
More information about the Commits
mailing list