Bug 552483 (CVE-2010-0013)

Summary: CVE-2010-0013 pidgin/libpurple: MSN custom smiley request directory traversal file disclosure
Product: [Other] Security Response Reporter: Tomas Hoger <thoger>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: bressers, kreilly, wtogami
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2010-02-10 07:17:04 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 552492, 552493, 552494, 552495, 552496, 833965    
Bug Blocks:    

Description Tomas Hoger 2010-01-05 10:06:37 UTC
On 26C3, Fabian Yamaguchi presented a directory traversal flaw in libpurple MSN protocol implementation.  The flaw can be used by the remote attacker to download arbitrary file readable by the user running instant messenger using libpurple (such as pidgin) from the victim's computer via MSN emoticon / smiley download request.  More details in Fabian's presentation:

(slides 10-22)

Upstream fix:

which depends on the other two commits:


Remove ~/.purple/custom_smiley/ directory if it exists.  The directory is not created by default and is created when first custom smiley is defined.

Comment 2 Fedora Update System 2010-01-12 23:40:51 UTC
pidgin-2.6.5-1.fc12 has been pushed to the Fedora 12 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 3 Fedora Update System 2010-01-12 23:49:10 UTC
pidgin-2.6.5-1.fc11 has been pushed to the Fedora 11 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 5 errata-xmlrpc 2010-01-14 17:23:31 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 4
  Red Hat Enterprise Linux 5

Via RHSA-2010:0044 https://rhn.redhat.com/errata/RHSA-2010-0044.html