Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 910039 - (CVE-2013-0271) CVE-2013-0271 pidgin: MXit protocol insufficient sanitization of saved image file names
CVE-2013-0271 pidgin: MXit protocol insufficient sanitization of saved image ...
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20130213,repor...
: Security
Depends On: 910826
Blocks: 909372
  Show dependency treegraph
 
Reported: 2013-02-11 11:48 EST by Jan Lieskovsky
Modified: 2013-03-04 01:40 EST (History)
3 users (show)

See Also:
Fixed In Version: pidgin 2.10.7
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2013-02-15 04:19:28 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
Local copy of (by Pidgin upstream) proposed patch to fix the CVE-2013-0271 issue (2.09 KB, patch)
2013-02-11 11:56 EST, Jan Lieskovsky
no flags Details | Diff

  None (edit)
Description Jan Lieskovsky 2013-02-11 11:48:38 EST
A security flaw was found in the way MXit protocol plug-in of libPurple generated temporary file used for image data storage, when processing Imagestrip MXit command. A rogue server or remote attacker could use this flaw to specify a file name, which in a partial manner would be used to generate the final local path, used for storage of image data on the local disk, possibly leading to attacker's ability to overwrite local files accessible with the privileges of the user running the pidgin executable.

Upstream ticket:
[1] http://pidgin.im/news/security/?id=65
Comment 2 Jan Lieskovsky 2013-02-11 11:56:22 EST
Created attachment 696213 [details]
Local copy of (by Pidgin upstream) proposed patch to fix the CVE-2013-0271 issue
Comment 3 Jan Lieskovsky 2013-02-11 11:57:25 EST
This issue did NOT affect the versions of the pidgin package, as shipped with Red Hat Enterprise Linux 5 and 6.

--

This issue affects the versions of the pidgin package, as shipped with Fedora release of 16, 17, and 18.
Comment 4 Jan Lieskovsky 2013-02-11 12:34:04 EST
Acknowledgements:

Red Hat would like to thank the Pidgin project for reporting this issue. Upstream acknowledges Chris Wysopal of Veracode as the original issue reporter.
Comment 5 Jan Lieskovsky 2013-02-11 12:34:48 EST
The versions of pidgin shipped with Red Hat Enterprise Linux 5 and 6, do not 
support the MXIT_CMD_IMAGESTRIP command, hence they are not vulnerable to this flaw.


Statement:

Not vulnerable. This issue did not affect the versions of pidgin, as shipped with Red Hat Enterprise Linux 5 and 6.
Comment 7 Jan Lieskovsky 2013-02-13 11:26:57 EST
Created pidgin tracking bugs for this issue

Affects: fedora-all [bug 910826]
Comment 8 Vincent Danen 2013-02-13 14:34:01 EST
External References:

http://www.pidgin.im/news/security/?id=65

Note You need to log in before you can comment on or make changes to this bug.