Vigil@nce - Pidgin: five vulnerabilities
June 2017 by Vigil@nce
This bulletin was written by Vigil@nce : https://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can use several vulnerabilities of Pidgin.
Impacted products: Debian, Fedora, openSUSE, openSUSE Leap,
Solaris, Slackware, Ubuntu.
Severity: 2/4.
Creation date: 05/04/2017.
DESCRIPTION OF THE VULNERABILITY
Several vulnerabilities were announced in Pidgin.
An attacker can act as a Man-in-the-Middle via SSL/TLS, in order
to read or write data in the session. [severity:2/4; CVE-2014-3694]
An attacker can trigger a fatal error via MXit Protocol, in order
to trigger a denial of service. [severity:2/4; CVE-2014-3695]
An attacker can trigger a fatal error via Groupwise Server
Message, in order to trigger a denial of service. [severity:2/4;
CVE-2014-3696]
An attacker can traverse directories via untar_block, in order to
read a file outside the root path. [severity:2/4; CVE-2014-3697]
An attacker can bypass security features via
jabber_idn_validate(), in order to obtain sensitive information.
[severity:2/4; CVE-2014-3698]
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
https://vigilance.fr/vulnerability/Pidgin-five-vulnerabilities-22333