Bug 1154911 (CVE-2014-3698)

Summary: CVE-2014-3698 pidgin: remote information leak via crafted XMPP message
Product: [Other] Security Response Reporter: Murray McAllister <mmcallis>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: cschalle, debarshir, jrusnack, mbarnes, security-response-team, sisharma, vdanen
Target Milestone: ---Keywords: Reopened, Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: pidgin 2.10.10 Doc Type: Bug Fix
Doc Text:
An information disclosure flaw was discovered in the way Pidgin parsed XMPP messages. A malicious remote server or a man-in-the-middle attacker could potentially use this flaw to disclose a portion of memory belonging to the Pidgin process by sending a specially crafted XMPP message.
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-08 02:35:23 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1155838, 1340770, 1403136, 1446519    
Bug Blocks: 1154913, 1415638    
Attachments:
Description Flags
patch from upstream none

Description Murray McAllister 2014-10-21 03:24:49 UTC
A flaw was found in the way XMPP messages were parsed. A malicious server or possibly a remote attacker could send a crafted XMPP message that would cause Pidgin to send an XMPP message containing arbitrary memory.

Acknowledgements:

Name: the Pidgin project
Upstream: Thijs Alkemade, Paul Aurich

Comment 1 Murray McAllister 2014-10-21 03:25:24 UTC
Created attachment 948789 [details]
patch from upstream

Comment 3 Murray McAllister 2014-10-23 01:18:51 UTC
Public now:

http://www.pidgin.im/news/security/?id=90

Comment 4 Murray McAllister 2014-10-23 01:27:28 UTC
Created pidgin tracking bugs for this issue:

Affects: fedora-all [bug 1155838]

Comment 5 Fedora Update System 2014-11-10 06:31:40 UTC
pidgin-2.10.10-2.fc21 has been pushed to the Fedora 21 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 6 Fedora Update System 2014-11-10 06:47:41 UTC
pidgin-2.10.10-1.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 9 Siddharth Sharma 2014-12-16 11:29:48 UTC
Analysis:

In code of jutil.c, jid being calloced, missing g_strndup would lead to NULL derefs in callers, which wont be something typically leading to info leaks and attacker wont get much even if in any scenario is able to read arbitrary memory.

Comment 14 errata-xmlrpc 2017-08-01 20:21:04 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2017:1854 https://access.redhat.com/errata/RHSA-2017:1854