Red Hat Bugzilla – Bug 552483
CVE-2010-0013 pidgin/libpurple: MSN custom smiley request directory traversal file disclosure
Last modified: 2015-07-31 07:48:40 EDT
On 26C3, Fabian Yamaguchi presented a directory traversal flaw in libpurple MSN protocol implementation. The flaw can be used by the remote attacker to download arbitrary file readable by the user running instant messenger using libpurple (such as pidgin) from the victim's computer via MSN emoticon / smiley download request. More details in Fabian's presentation:
which depends on the other two commits:
Remove ~/.purple/custom_smiley/ directory if it exists. The directory is not created by default and is created when first custom smiley is defined.
pidgin-2.6.5-1.fc12 has been pushed to the Fedora 12 stable repository. If problems still persist, please make note of it in this bug report.
pidgin-2.6.5-1.fc11 has been pushed to the Fedora 11 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in following products:
Red Hat Enterprise Linux 4
Red Hat Enterprise Linux 5
Via RHSA-2010:0044 https://rhn.redhat.com/errata/RHSA-2010-0044.html