www: 6046e18d: Check in the info about the three securi...
markdoliner at pidgin.im
markdoliner at pidgin.im
Thu Feb 18 03:25:22 EST 2010
-----------------------------------------------------------------
Revision: 6046e18d3eed22aa2c659f45c58b1af13ad0691a
Ancestor: 249e790fed38b96377a79738bae1f21a9907b57e
Author: markdoliner at pidgin.im
Date: 2010-02-18T08:21:49
Branch: im.pidgin.www
URL: http://d.pidgin.im/viewmtn/revision/info/6046e18d3eed22aa2c659f45c58b1af13ad0691a
Modified files:
htdocs/news/security/index.php
ChangeLog:
Check in the info about the three security vulnerabilities
-------------- next part --------------
============================================================
--- htdocs/news/security/index.php f0f26225e8df0acf6cbe1d426a5c021397d0d90d
+++ htdocs/news/security/index.php b4e6b1b9a6654a099b9594bacdc4920e9908d721
@@ -404,7 +404,7 @@ $vulnerabilities = array(
"title" => "MSN handwritten message crash",
"date" => "3 September 2009",
"cve" => "CVE-2009-3084",
- "summary" => "MSN incorrectly handles incoming handwritten messages, which can lead to a crash.",
+ "summary" => "MSN incorrectly handles incoming handwritten messages, which can lead to a crash",
"description" => "The MSN protocol plugin used an incorrect character encoding when attempting to convert handwritten messages from one encoding to another. This caused the conversion to fail. This failure combined with an uninitialized variable can trigger a crash. The only vulnerable versions of libpurple are 2.6.0 and 2.6.1.",
"fix" => "Use the correct character set name and initialize error to NULL.",
"fixrevisions" => "567e16cbc46168f52482e5ec27626c48e7a5ba95",
@@ -454,6 +454,39 @@ $vulnerabilities = array(
"fixrevisions" => "c64a1adc8bda2b4aeaae1f273541afbc4f71b810",
"fixedversion" => "2.6.5",
"discoveredby" => "Fabian Yamaguchi"
+ ),
+ array(
+ "title" => "MSN malformed SLP message crash",
+ "date" => "2010-02-18",
+ "cve" => "CVE-2010-0277",
+ "summary" => "Failure to validate all fields of an incoming message can trigger a crash",
+ "description" => "Certain malformed SLP messages can trigger a crash because the MSN protocol plugin fails to check that all pieces of the message are set correctly.",
+ "fix" => "Validate input before attempting to handle the message.",
+ "fixrevisions" => "784bc8bff5affb83cee8a5a9353cb0a8220a72ce",
+ "fixedversion" => "2.6.6",
+ "discoveredby" => "Fabian Yamaguchi"
+ ),
+ array(
+ "title" => "Finch XMPP MUC crash",
+ "date" => "2010-02-18",
+ "cve" => "CVE-2010-0420",
+ "summary" => "Certain nicknames in group chat rooms can trigger a crash in Finch",
+ "description" => "In a user in a multi-user chat room has a nickname containing '<br>' then libpurple ends up having two users with username '\n' in the room, and Finch crashes in this situation. We do not believe there is a possibility of remote code execution.",
+ "fix" => "Correctly parse '<br>' so that it appears literally rather than as '\n'.",
+ "fixrevisions" => "0085c32abf29d034d30feef1ffb1d483e316a9a8,ab4716ed6857f669ceb0296e5480729aafba2e9f",
+ "fixedversion" => "2.6.6",
+ "discoveredby" => "Sadrul Habib Chowdhury"
+ ),
+ array(
+ "title" => "Smiley denial of service",
+ "date" => "2010-02-18",
+ "cve" => "CVE-2010-0423",
+ "summary" => "Pidgin can become unresponse when displaying large numbers of smileys",
+ "description" => "oCERT notified us about a problem in Pidgin, where a large amount of processing time will be used when inserting many smileys into an IM or chat window. This should not cause a crash, but Pidgin can become unusable slow.",
+ "fix" => "A limit was added for the maximum number of smileys allowed in a conversation.",
+ "fixrevisions" => "d1009efa4da45e8abd8279b454505554627c67c6",
+ "fixedversion" => "2.6.6",
+ "discoveredby" => "Antti Hayrynen"
)
);
/* Template for the unfortunate future
More information about the Commits
mailing list