Fwd: [Pidgin] #2216: Vulnerability in Pidgin 2.0.2 - remote authenticated to execute commands
Luke Schierer
lschiere at pidgin.im
Fri Jul 20 13:05:55 EDT 2007
Dear packagers,
This has come to our attention repeatedly, though this is the first
incredibly public post about it that I know of. Unfortunately, we have
absolutely no details on it. We do not see what the vulnerability is,
and everything just links back to the wslabi page, which tells us
nothing, and whose administrators refuse to tell us anything.
So this email is basically just an FYI for now.
luke
----- Forwarded message from Pidgin <trac at pidgin.im> -----
Date: Fri, 20 Jul 2007 16:19:46 -0000
From: Pidgin <trac at pidgin.im>
Cc: tracker at pidgin.im
Subject: [Pidgin] #2216: Vulnerability in Pidgin 2.0.2 - remote
authenticated to execute commands
#2216: Vulnerability in Pidgin 2.0.2 - remote authenticated to execute commands
--------------------+-------------------------------------------------------
Reporter: pr0gm3r | Owner: sadrul
Type: defect | Status: new
Priority: minor | Component: finch (gnt/ncurses)
Version: 2.0.2 | Keywords: vulnerability, exploit, security
Pending: 0 |
--------------------+-------------------------------------------------------
Vulnerability Summary CVE-2007-3841
Original release date: 7/17/2007
Last revised: 7/19/2007
Source: US-CERT/NIST
Overview
Unspecified vulnerability in Pidgin (formerly Gaim) 2.0.2 for Linux allows
remote authenticated users, who are listed in a users list, to execute
certain commands via unspecified vectors, aka ZD-00000035. NOTE: this
information is based upon a vague advisory by a vulnerability information
sales organization that does not coordinate with vendors or release
actionable advisories. A CVE has been assigned for tracking purposes, but
duplicates with other CVEs are difficult to determine.
Impact
CVSS Severity (version 2.0):
Base score: 9.0 (High)
Impact Subscore: 10.0
Exploitability Subscore: 8.0
Range: Network exploitable
Authentication: Required to exploit
Impact Type: Provides administrator access, Allows complete
confidentiality, integrity, and availability violation , Allows
unauthorized disclosure of information , Allows disruption of service
References to Advisories, Solutions, and Tools
External Source: (disclaimer)
Hyperlink: http://www.wslabi.com/wabisabilabi/initPublishedBid.do?
External Source: BID (disclaimer)
Name: 24904
Hyperlink: http://www.securityfocus.com/bid/24904
Vulnerable software and versions
Configuration 1
− Pidgin, Pidgin, 2.0.2, Linux
Technical Details
CVSS Base Score Vector: (AV:N/AC:L/Au:S/C:C/I:C/A:C) (legend)
Vulnerability Type: Input Validation Error
CVE Standard Vulnerability Entry:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3841
Common Platform Enumeration:
http://nvd.nist.gov/cpe.cfm?cvename=CVE-2007-3841
--
Ticket URL: <http://developer.pidgin.im/ticket/2216>
Pidgin <http://pidgin.im>
Pidgin
_______________________________________________
Tracker mailing list
Tracker at pidgin.im
http://pidgin.im/cgi-bin/mailman/listinfo/tracker
----- End forwarded message -----
More information about the Packagers
mailing list