You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa pidgin

Sigurnosni nedostatak programskog paketa pidgin

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-2216-1
May 21, 2014

pidgin vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 14.04 LTS
– Ubuntu 13.10
– Ubuntu 12.04 LTS

Summary:

Pidgin could be made to crash or run programs if it received specially
crafted network traffic.

Software Description:
– pidgin: graphical multi-protocol instant messaging client for X

Details:

It was discovered that Pidgin incorrectly handled certain messages from
Gadu-Gadu file relay servers. A malicious remote server or a man in the
middle could use this issue to cause Pidgin to crash, resulting in a denial
of service, or possibly execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS:
libpurple0 1:2.10.9-0ubuntu3.1
pidgin 1:2.10.9-0ubuntu3.1

Ubuntu 13.10:
libpurple0 1:2.10.7-0ubuntu4.1.13.10.2
pidgin 1:2.10.7-0ubuntu4.1.13.10.2

Ubuntu 12.04 LTS:
libpurple0 1:2.10.3-0ubuntu1.5
pidgin 1:2.10.3-0ubuntu1.5

After a standard system update you need to restart Pidgin to make all the
necessary changes.

References:
http://www.ubuntu.com/usn/usn-2216-1
CVE-2014-3775

Package Information:
https://launchpad.net/ubuntu/+source/pidgin/1:2.10.9-0ubuntu3.1
https://launchpad.net/ubuntu/+source/pidgin/1:2.10.7-0ubuntu4.1.13.10.2
https://launchpad.net/ubuntu/+source/pidgin/1:2.10.3-0ubuntu1.5

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird – http://www.enigmail.net/
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=tTgy
—–END PGP SIGNATURE—–

AutorMarijo Plepelic
Cert idNCERT-REF-2014-05-0016-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa lxml

Otkriven je sigurnosni nedostatak u programskom paketu lxml. Otkriveni nedostatak je uzrokovan nepravilnim izuzimanjem kontrolnih znakova što potencijalnim napadačima omogućuje...

Close