QID 671085

Date Published: 2021-11-29

QID 671085: EulerOS Security Update for pidgin (EulerOS-SA-2019-2387)

Pidgin is an instant messaging program which can log in to multiple accounts on multiple instant messaging networks simultaneously.
security fix(es): an information leak exists in the handling of the mxit protocol in pidgin.
Specially crafted mxit data sent via the server could potentially result in an out-of-bounds read.
A malicious user, server, or man-in-the-middle can send an invalid size for an avatar which will trigger an out-of-bounds read vulnerability.
This could result in a denial of service or copy data from memory to the file, resulting in an information leak if the avatar is sent to another user.(cve-2016-2367) a denial of service vulnerability exists in the handling of the mxit protocol in pidgin.
Specially crafted mxit data sent from the server could potentially result in an out-of-bounds read.
A malicious server or man-in-the-middle attacker can send invalid data to trigger this vulnerability.(cve-2016-2370) a denial of service vulnerability exists in the handling of the mxit protocol in pidgin.
Specially crafted mxit data sent via the server could potentially result in a null pointer dereference.
A malicious server or an attacker who intercepts the network traffic can send invalid data to trigger this vulnerability and cause a crash.(cve-2016-2365) a buffer overflow vulnerability exists in the handling of the mxit protocol pidgin.
Specially crafted data sent via the server could potentially result in a buffer overflow, potentially resulting in memory corruption.
Specially crafted mxit data sent via the server could potentially result in a denial of service vulnerability.

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

An arbitrary attacker may exploit this vulnerability to compromise the system.

  • CVSS V3 rated as Critical - 8.1 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    The Vendor has released a security update to fix the vulnerability. For more information please visit EulerOS-SA-2019-2387 for updates and patch information
    Software Advisories
    Advisory ID Software Component Link
    EulerOS-SA-2019-2387 EulerOS V2.0SP2 URL Logo developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2387