Pidgin 2.4.1 Vulnerability

2008.06.28
Credit: jplopezy
Risk: Low
Local: No
Remote: Yes
CWE: CWE-20


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: None
Availability impact: Partial

Application: Pidgin 2.4.1 OS: Linux - Ubuntu 8.04 ------------------------------------------------------ 1 - Description 2 - Vulnerability 3 - POC/EXPLOIT ------------------------------------------------------ Description Pidgin is an instant messaging program with which you can use a number of protocols known as (MSN, ICQ, AIM). While there is Pidgin 2.4.2 version which was not provided in this version so I could not say whether it was also vulnerable. ------------------------------------------------------ Vulnerability The vulnerability works sending files with the protocol msn (I did not test at all protocols), if a file is sent with a long name and special characters and this causes the program to break. If we analyze the vulnerability with a debugger you can see a flaw in the following function 0xb62abaeb in msn_slplink_process_msg According with the characters used, the fault may vary in other functions. ------------------------------------------------------ POC/EXPLOIT For proof of the concept you should create a file either (never mind the extension) with the maximum allowable characters, with the following characteristics. ASCII = (‣ ․ ‥ � ) HEX = ( 26 23 38 32 32 37 3b 20 26 23 38 32 32 38 3b 20 26 23 38 32 32 39 3b 20 85 ) ------------------------------------------------------ Juan Pablo Lopez Yacubian

References:

http://www.securityfocus.com/archive/1/archive/1/493682/100/0/threaded
http://www.frsirt.com/english/advisories/2008/1947
http://secunia.com/advisories/30881


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2021, cxsecurity.com

 

Back to Top