4 vulnerabilities in libpurple

Richard Johnson rjohnson at sourcefire.com
Mon Sep 29 22:03:25 EDT 2014


Hello Daniel, we haven't seen any progress on these since April, do you
have an ETA for delivery?

On Sun, Apr 13, 2014 at 12:20 AM, Mark Doliner <mark at kingant.net> wrote:

> Hi! I fixed the three remaining issues in our private code repo. We're
> still working on a few other issues and we don't yet have an ETA for
> release. We'll keep you updated on any progress.
>
> On Sun, Feb 9, 2014 at 12:45 PM, Daniel Atallah
> <daniel.atallah at gmail.com> wrote:
> > VRT-2014-0203 - Pidgin libpurple Mxit Emoticon ASN Length Denial of
> Service
> > Vulnerability:
> > This looks legitimate and still exists in Pidgin 2.10.9
>
> I fixed this in our private 2.x.y repo (patch attached in case you'd
> like to review it).
>
> > VRT-2014-0205 - Pidgin libpurple Novell Protocol Multiple Denial of
> Service
> > Vulnerabilities:
> > This looks legitimate and still exists in Pidgin 2.10.9.
> > The title for this one in the file refers to Gadu-Gadu - I assume that's
> > just a copy/paste error.
>
> I fixed this in our private 2.x.y repo (patch attached in case you'd
> like to review it).
>
> > VRT-2014-0205 - Pidgin Theme/Smiley Untar Arbitrary File Write
> > Vulnerability:
> > This looks legitimate and still exists in Pidgin 2.10.9
>
> I fixed this in our private 2.x.y repo (patch attached in case you'd
> like to review it). Were you guys actually able to exploit this? I
> wasn't able to. I could not drag links from a browser to the smiley
> pane of prefs in Windows. I could drag a local file from Windows
> Explorer to the smiley window, but of course that's a valid file name.
>



-- 
Richard Johnson
Sourcefire VRT
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://pidgin.im/cgi-bin/mailman/private/security/attachments/20140929/62c28edf/attachment.html>


More information about the security mailing list