pidgin-2.10.11-5.el7
エラータID: AXSA:2017-1913:01
Pidgin allows you to talk to anyone using a variety of messaging
protocols including AIM, MSN, Yahoo!, Jabber, Bonjour, Gadu-Gadu,
ICQ, IRC, Novell Groupwise, QQ, Lotus Sametime, SILC, Simple and
Zephyr. These protocols are implemented using a modular, easy to
use design. To use a protocol, just add an account using the
account editor.
Pidgin supports many common features of other clients, as well as many
unique features, such as perl scripting, TCL scripting and C plugins.
Pidgin is not affiliated with or endorsed by America Online, Inc.,
Microsoft Corporation, Yahoo! Inc., or ICQ Inc.
CVE-2014-3694
The (1) bundled GnuTLS SSL/TLS plugin and the (2) bundled OpenSSL
SSL/TLS plugin in libpurple in Pidgin before 2.10.10 do not properly
consider the Basic Constraints extension during verification of X.509
certificates from SSL servers, which allows man-in-the-middle
attackers to spoof servers and obtain sensitive information via a
crafted certificate.
CVE-2014-3695
markup.c in the MXit protocol plugin in libpurple in Pidgin before
2.10.10 allows remote servers to cause a denial of service
(application crash) via a large length value in an emoticon response.
CVE-2014-3696
nmevent.c in the Novell GroupWise protocol plugin in libpurple in
Pidgin before 2.10.10 allows remote servers to cause a denial of
service (application crash) via a crafted server message that triggers
a large memory allocation.
CVE-2014-3698
The jabber_idn_validate function in jutil.c in the Jabber protocol
plugin in libpurple in Pidgin before 2.10.10 allows remote attackers
to obtain sensitive information from process memory via a crafted XMPP
message.
CVE-2017-2640
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.
Update packages.
The (1) bundled GnuTLS SSL/TLS plugin and the (2) bundled OpenSSL SSL/TLS plugin in libpurple in Pidgin before 2.10.10 do not properly consider the Basic Constraints extension during verification of X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
markup.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.10 allows remote servers to cause a denial of service (application crash) via a large length value in an emoticon response.
nmevent.c in the Novell GroupWise protocol plugin in libpurple in Pidgin before 2.10.10 allows remote servers to cause a denial of service (application crash) via a crafted server message that triggers a large memory allocation.
The jabber_idn_validate function in jutil.c in the Jabber protocol plugin in libpurple in Pidgin before 2.10.10 allows remote attackers to obtain sensitive information from process memory via a crafted XMPP message.
An out-of-bounds write flaw was found in the way Pidgin before 2.12.0 processed XML content. A malicious remote server could potentially use this flaw to crash Pidgin or execute arbitrary code in the context of the pidgin process.
N/A
SRPMS
- pidgin-2.10.11-5.el7.src.rpm
MD5: c7b2e0744618b7e3f4912e8ad39d3cf3
SHA-256: 4b88126b0836adf1e0d49931a09d11126e5d6ce2b54d83964886091d9d855a1d
Size: 9.08 MB
Asianux Server 7 for x86_64
- libpurple-2.10.11-5.el7.x86_64.rpm
MD5: d2729a55861982a00ea91906073db805
SHA-256: a639c913a55da62c7da7534b9c673f5fa54db20b981652fd199634399f86764d
Size: 5.64 MB - libpurple-2.10.11-5.el7.i686.rpm
MD5: 7f2e149f9657e6d4cadfb3760db0f20a
SHA-256: 135dd420adcf4481ab827ebed1b32050383900d716e8765a29e43aed9c3895fa
Size: 5.62 MB