Skip to navigation

Security Advisory Important: pidgin security update

Advisory: RHSA-2009:1059-1
Type: Security Advisory
Severity: Important
Issued on: 2009-05-22
Last updated on: 2009-05-22
Affected Products: Red Hat Desktop (v. 3)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux WS (v. 3)
CVEs (cve.mitre.org): CVE-2009-1373
CVE-2009-1376

Details

An updated pidgin package that fixes two security issues is now available
for Red Hat Enterprise Linux 3.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

Pidgin is an instant messaging program which can log in to multiple
accounts on multiple instant messaging networks simultaneously.

A buffer overflow flaw was found in the way Pidgin initiates file transfers
when using the Extensible Messaging and Presence Protocol (XMPP). If a
Pidgin client initiates a file transfer, and the remote target sends a
malformed response, it could cause Pidgin to crash or, potentially, execute
arbitrary code with the permissions of the user running Pidgin. This flaw
only affects accounts using XMPP, such as Jabber and Google Talk.
(CVE-2009-1373)

It was discovered that on 32-bit platforms, the Red Hat Security Advisory
RHSA-2008:0584 provided an incomplete fix for the integer overflow flaw
affecting Pidgin's MSN protocol handler. If a Pidgin client receives a
specially-crafted MSN message, it may be possible to execute arbitrary code
with the permissions of the user running Pidgin. (CVE-2009-1376)

Note: By default, when using an MSN account, only users on your buddy list
can send you messages. This prevents arbitrary MSN users from exploiting
this flaw.

All Pidgin users should upgrade to this update package, which contains
backported patches to resolve these issues. Pidgin must be restarted for
this update to take effect.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Desktop (v. 3)

SRPMS:
pidgin-1.5.1-3.el3.src.rpm
File outdated by:  RHSA-2009:1535
    MD5: ce5026e2ce8820f37d4b338668648a93
 
IA-32:
pidgin-1.5.1-3.el3.i386.rpm
File outdated by:  RHSA-2009:1535
    MD5: 3d831a06a3abd87cd58d57b6188c1697
 
x86_64:
pidgin-1.5.1-3.el3.x86_64.rpm
File outdated by:  RHSA-2009:1535
    MD5: c83b408d4d1db10eec8a6d68a9d851af
 
Red Hat Enterprise Linux AS (v. 3)

SRPMS:
pidgin-1.5.1-3.el3.src.rpm
File outdated by:  RHSA-2009:1535
    MD5: ce5026e2ce8820f37d4b338668648a93
 
IA-32:
pidgin-1.5.1-3.el3.i386.rpm
File outdated by:  RHSA-2009:1535
    MD5: 3d831a06a3abd87cd58d57b6188c1697
 
IA-64:
pidgin-1.5.1-3.el3.ia64.rpm
File outdated by:  RHSA-2009:1535
    MD5: 68e6967041e7dc29c0d3e63a6fd37b4b
 
PPC:
pidgin-1.5.1-3.el3.ppc.rpm
File outdated by:  RHSA-2009:1535
    MD5: b2d8a78584bded2bae3e802846492afa
 
s390:
pidgin-1.5.1-3.el3.s390.rpm
File outdated by:  RHSA-2009:1535
    MD5: 6991efcda33dfe4492604746cee0e253
 
s390x:
pidgin-1.5.1-3.el3.s390x.rpm
File outdated by:  RHSA-2009:1535
    MD5: 6e64116bf96e1eba8417f167dda8fd02
 
x86_64:
pidgin-1.5.1-3.el3.x86_64.rpm
File outdated by:  RHSA-2009:1535
    MD5: c83b408d4d1db10eec8a6d68a9d851af
 
Red Hat Enterprise Linux ES (v. 3)

SRPMS:
pidgin-1.5.1-3.el3.src.rpm
File outdated by:  RHSA-2009:1535
    MD5: ce5026e2ce8820f37d4b338668648a93
 
IA-32:
pidgin-1.5.1-3.el3.i386.rpm
File outdated by:  RHSA-2009:1535
    MD5: 3d831a06a3abd87cd58d57b6188c1697
 
IA-64:
pidgin-1.5.1-3.el3.ia64.rpm
File outdated by:  RHSA-2009:1535
    MD5: 68e6967041e7dc29c0d3e63a6fd37b4b
 
x86_64:
pidgin-1.5.1-3.el3.x86_64.rpm
File outdated by:  RHSA-2009:1535
    MD5: c83b408d4d1db10eec8a6d68a9d851af
 
Red Hat Enterprise Linux WS (v. 3)

SRPMS:
pidgin-1.5.1-3.el3.src.rpm
File outdated by:  RHSA-2009:1535
    MD5: ce5026e2ce8820f37d4b338668648a93
 
IA-32:
pidgin-1.5.1-3.el3.i386.rpm
File outdated by:  RHSA-2009:1535
    MD5: 3d831a06a3abd87cd58d57b6188c1697
 
IA-64:
pidgin-1.5.1-3.el3.ia64.rpm
File outdated by:  RHSA-2009:1535
    MD5: 68e6967041e7dc29c0d3e63a6fd37b4b
 
x86_64:
pidgin-1.5.1-3.el3.x86_64.rpm
File outdated by:  RHSA-2009:1535
    MD5: c83b408d4d1db10eec8a6d68a9d851af
 

Bugs fixed (see bugzilla for more information)

500488 - CVE-2009-1373 pidgin file transfer buffer overflow
500493 - CVE-2009-1376 pidgin incomplete fix for CVE-2008-2927


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/