Full Disclosure mailing list archives

[PLSA 2008-18] Pidgin: Spoofing Vulnerability


From: Pınar Yanardağ <pinar () pardus org tr>
Date: Thu, 07 Aug 2008 03:27:31 +0300

------------------------------------------------------------------------
Pardus Linux Security Advisory 2008-18            security () pardus org tr
------------------------------------------------------------------------
       Date: 2008-08-07
   Severity: 2
       Type: Remote
------------------------------------------------------------------------

Summary
=======

A security issue has been reported in Pidgin, which can be exploited by
malicious people to conduct spoofing attacks.


Description
===========

The problem is that the certificate presented by e.g. a Jabber server at
the beginning of an SSL session is not verified. This can be  exploited
to spoof valid servers via a man-in-the-middle attack.



Successful exploitation requires that Pidgin is configured to  use  the
NSS plugin.


Affected packages:

   Pardus 2008:
     pidgin, all before 2.4.3-21-3

   Pardus 2007:
     pidgin, all before 2.4.3-21-14


Resolution
==========

There are update(s) for pidgin. You can update them via Package Manager
or with a single command from console:

   Pardus 2008:
     pisi up pidgin

   Pardus 2007:
     pisi up pidgin


References
==========

   * http://secunia.com/advisories/31390/
   * http://developer.pidgin.im/ticket/6500

------------------------------------------------------------------------

-- 
Pınar Yanardağ
http://pinguar.org


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Current thread: