www: a1dfc08b: security updates, not done yet
khc at pidgin.im
khc at pidgin.im
Thu May 21 04:05:38 EDT 2009
-----------------------------------------------------------------
Revision: a1dfc08b984df5f210df6ba536b862373842bec0
Ancestor: 4dcf2c511caab3271ef252c3b17e55f4773a592a
Author: khc at pidgin.im
Date: 2009-05-21T07:59:57
Branch: im.pidgin.www
URL: http://d.pidgin.im/viewmtn/revision/info/a1dfc08b984df5f210df6ba536b862373842bec0
Modified files:
htdocs/news/security/index.php
ChangeLog:
security updates, not done yet
-------------- next part --------------
============================================================
--- htdocs/news/security/index.php 149e5d27ef7bc6541495f3ef00e83db89557332e
+++ htdocs/news/security/index.php c4ef4862c4b9c0a7daabd507381e276cd8b52003
@@ -307,6 +307,46 @@ $vulnerabilities = array(
"fix" => "SSL/TLS Certificates are now verified in the NSS implementation in libpurple.",
"fixedversion" => "2.5.0",
"discoveredby" => "Josh Triplett"
+ ),
+ array(
+ "title" => "XMPP file transfer buffer overflow",
+ "date" => "2 May 2009",
+ "cve" => "CVE-2009-1373",
+ "summary" => "Buffer overflow is possible when initiating file transfer to a malicious buddy over XMPP",
+ "description" => "",
+ "fix" => "",
+ "fixedversion" => "2.5.6",
+ "discoveredby" => "Vercode"
+ ),
+ array(
+ "title" => "QQ remote DoS",
+ "date" => "3 May 2009",
+ "cve" => "CVE-2009-1374",
+ "summary" => "Possible remote denial of service when receiving a QQ packet",
+ "description" => "decrypt_out() always writes 8 bytes past the passed in buffer, which is always allocated on the stack. We don't believe this can cause anything outside of a crash.",
+ "fix" => "decrypt_out() is fixed to not write past the buffer.",
+ "fixedversion" => "2.5.6",
+ "discoveredby" => "Ka-Hing Cheung"
+ ),
+ array(
+ "title" => "Remote DoS in multiple protocols",
+ "date" => "20 Mar 2009",
+ "cve" => "CVE-2009-1375",
+ "summary" => "Remote denial of service that affects several protocols",
+ "description" => "A buffer maintained by PurpleCircBuffer may be corrupted if it's exactly full and then more bytes are added to it, leading to a crash. This structure is used by XMPP and Sametime protocol plugins",
+ "fix" => "PurpleCircBuffer now does bounds check correctly",
+ "fixedversion" => "2.5.6",
+ "discoveredby" => "Josef Andrysek"
+ ),
+ array(
+ "title" => "MSN malformed SLP message overflow",
+ "date" => "2 May 2009",
+ "cve" => "CVE-2009-1376",
+ "summary" => "Malformed SLP messages can cause a buffer overflow",
+ "description" => "The previous fix to <a href=\"/news/security/?id=25\">CVE-2008-2927</a> was deemed incomplete. The size check improperly casted an uint64 to size_t which can cause an integer overflow, rendering the check useless.",
+ "fix" => "Proper variable type is now used when doing size comparison. Additionally the malformed message is now properly discarded.",
+ "fixedversion" => "2.5.6",
+ "discoveredby" => ""
)
);
/* Template for the unfortunate future
More information about the Commits
mailing list