You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa pidgin

Sigurnosni nedostaci programskog paketa pidgin

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-3031-1
July 12, 2016

pidgin vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 15.10
– Ubuntu 14.04 LTS
– Ubuntu 12.04 LTS

Summary:

Pidgin could be made to crash or run programs if it received
specially crafted network traffic.

Software Description:
– pidgin: graphical multi-protocol instant messaging client for X

Details:

Yves Younan discovered that Pidgin contained multiple issues in the MXit
protocol support. A remote attacker could use this issue to cause Pidgin to
crash, resulting in a denial of service, or possibly execute arbitrary
code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 15.10:
libpurple0 1:2.10.11-0ubuntu4.2

Ubuntu 14.04 LTS:
libpurple0 1:2.10.9-0ubuntu3.3

Ubuntu 12.04 LTS:
libpurple0 1:2.10.3-0ubuntu1.7

After a standard system update you need to restart Pidgin to make all the
necessary changes.

References:
http://www.ubuntu.com/usn/usn-3031-1
CVE-2016-2365, CVE-2016-2366, CVE-2016-2367, CVE-2016-2368,
CVE-2016-2369, CVE-2016-2370, CVE-2016-2371, CVE-2016-2372,
CVE-2016-2373, CVE-2016-2374, CVE-2016-2375, CVE-2016-2376,
CVE-2016-2377, CVE-2016-2378, CVE-2016-2380, CVE-2016-4323

Package Information:
https://launchpad.net/ubuntu/+source/pidgin/1:2.10.11-0ubuntu4.2
https://launchpad.net/ubuntu/+source/pidgin/1:2.10.9-0ubuntu3.3
https://launchpad.net/ubuntu/+source/pidgin/1:2.10.3-0ubuntu1.7

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2

iQIcBAEBCgAGBQJXhSTuAAoJEGVp2FWnRL6TYsEP/1d6aHxAhbaW3JFXdjTmBw5t
xMfx7lNXtcdDjjQusoALXdD+97LC/qVW82kUBk/5hqp7lxUPv7A9Ixd4C4MR3g3l
1WhHZksqxLVH+AeyLHcxeos/KFRBi+mUWaxkUIkh5ovN0bJ6XjZpCuAWEY8boWB1
sbHSWrToqfJ/bsXOERA1Kj0x8TxKlV7vUYDMZQj2trIUOzvpOIwhe69gDkMga7iI
OITInsqEUWLQsgr7NZHgWvZAUHghSCJoBf7JO2bfpw8I3SyL12k1rT6SDDf96QDo
hCqXclBDe1ktQu16UoNhbdPotKuIXkTtud/51F4oLSuuPlfgeGujT/MxLfIEAIXQ
Skm0WsBPKhOcxvOZSmKHxzkO5ogLj0ZqChOlLyVAwIdfXs1nRfMtAZcHllfcjEIe
xizH4rdFmAjdZLjGPynW1lWj65AmZI1w/vh6E9cTim7ypdjiKCIucKl6tbZjCtqY
7b/0hygJfO66tsbzox4aUXkozWiqw4U3OFCL6gCLAhM4sM4Zk/CAQqlG1kYV+tXb
i6s0FRoUT6HjYWfPdCjcMMV9kNl5sfShyu1YtKPMMIq8FZZCuMX4j8EI+Z1/9WL7
QMTY6l8DyoLblrI01fjtKJFMjoJK1BmHnys8tCWlOLU1y9gedId3TuLTVyK5OzpS
SPPPEf0P0O2nHt20P+hU
=5mE2
—–END PGP SIGNATURE—–

AutorTomislav Protega
Cert idNCERT-REF-2016-07-0032-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Ranjivost jezgre operacijskog sustava RHEL 7

Otkrivena je ranjivost u načinu kojim je jezgrin TTY podsustav upravljao tty fazom gašenja, što lokalnom neprivilegiranom korisniku može poslužiti...

Close