Bug 819449 (CVE-2012-2214)

Summary: CVE-2012-2214 pidgin: Invalid memory dereference in the XMPP protocol plug-in by processing serie of specially-crafted file transfer requests
Product: [Other] Security Response Reporter: Jan Lieskovsky <jlieskov>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: itamar, jrb, mbarnes, stu
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: pidgin 2.10.4 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2012-07-11 05:17:09 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 819454    
Bug Blocks: 819458    

Description Jan Lieskovsky 2012-05-07 10:04:57 UTC
A denial service flaw was found in the way XMPP protocol plug-in of Pidgin, a Gtk+ based multiprotocol instant messaging client, performed cleanup for certain SOCKS5 connections. A remote attacker, being present on the buddy list of the victim, and able to trick the victim into accepting of a serie of specially-crafted XMPP file transfer requests, could use this flaw to cause pidgin executable crash.

Upstream advisory:
[1] http://www.pidgin.im/news/security/?id=62

Relevant upstream patch:
[2] http://developer.pidgin.im/viewmtn/revision/info/d991ff6d558d185527a09eae0378edb3fc7057a5

Comment 1 Jan Lieskovsky 2012-05-07 10:06:30 UTC
This issue affects the versions of the pidgin package, as shipped with Red Hat Enterprise Linux 5 and 6.

--

This issue affects the versions of the pidgin package, as shipped with Fedora release of 15 and 16. Please schedule an update.

Comment 2 Jan Lieskovsky 2012-05-07 10:07:52 UTC
Created pidgin tracking bugs for this issue

Affects: fedora-all [bug 819454]

Comment 3 Jan Lieskovsky 2012-05-07 16:08:03 UTC
The duplicate CVE identifier of CVE-2012-2323 has been also assigned to this issue by mistake:
http://www.openwall.com/lists/oss-security/2012/05/07/12

But CVE-2012-2214 one should be used when referencing to this deficiency (CVE-2012-2323 will rejected as duplicate of CVE-2012-2214).

Comment 4 Jan Lieskovsky 2012-05-10 17:01:22 UTC
Upstream v2.10.4 announcement:
http://pidgin.im/pipermail/devel/2012-May/010756.html

and Changelog:
http://developer.pidgin.im/wiki/ChangeLog

Comment 10 Huzaifa S. Sidhpurwala 2012-07-11 05:15:52 UTC
Statement:

Not Vulnerable. This issue does not affect the version of pidgin as shipped with Red Hat Enterprise Linux 5 and 6.