[oss-security] libpurple vulnerability disclosure and fix
Josh Bressers
bressers at redhat.com
Tue Oct 4 14:02:09 EDT 2011
Please use CVE-2011-3594.
Thanks.
--
JB
----- Original Message -----
> Hello all,
>
> A libpurple vulnerability was made known to the Pidgin developers via
> our public bug tracker which affects the SILC protocol plugin and all
> software which uses SILC via libpurple. The original identification
> of the vulnerability and bug report was made by Diego Bauche Madero
> from IOActive <diego.madero at ioactive.com>, and can be seen on the
> Pidgin bug tracker as Bug #14636:
>
> http://developer.pidgin.im/ticket/14636
>
> The vulnerability lies in calling g_markup_escape_text() on strings
> which have not been verified as valid UTF-8. This function is not
> required to do anything reasonable with invalid UTF-8, and indeed
> reads past the end of the string and will eventually segfault for
> certain sequences in some versions of Glib 2. Because the behavior
> of
> this function is undefined, and depends on the particular version of
> Glib 2 in use, the complete ramifications of this bug are unknown.
> Remote crashing of a libpurple client by untrusted users via
> specifically crafted SILC messages is a verified vulnerability.
>
> This bug is believed to affect all releases of libpurple up to and
> including version 2.10.0.
>
> The correct fix for this bug is UTF-8 validation (and correction if
> necessary) of the incoming string before passing it to Glib. A patch
> which provides this fix has been applied to the Pidgin sources in
> revision 7eb1f6d56cc58bbb5b56b7df53955d36b9b419b8 and will appear in
> all future Pidgin releases. For reference, it is:
>
> http://developer.pidgin.im/viewmtn/revision/diff/be5e66abad2af29604bc794cc4c6600ab12751f3/with/7eb1f6d56cc58bbb5b56b7df53955d36b9b419b8
>
> All packagers of libpurple (including monolithic Pidgin and/or finch
> packages) who have not already done so are encouraged to apply this
> change to their packages immediately.
>
> We would also like to request a CVE number for this issue.
>
> Any sensitive follow-ups to this issue, or any other Pidgin, finch,
> or
> libpurple issue, may be directed to security at pidgin.im.
>
> Thank you,
> Ethan
>
More information about the security
mailing list