Bug 910039 (CVE-2013-0271) - CVE-2013-0271 pidgin: MXit protocol insufficient sanitization of saved image file names
Summary: CVE-2013-0271 pidgin: MXit protocol insufficient sanitization of saved image ...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2013-0271
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 910826
Blocks: 909372
TreeView+ depends on / blocked
 
Reported: 2013-02-11 16:48 UTC by Jan Lieskovsky
Modified: 2023-05-12 19:03 UTC (History)
3 users (show)

Fixed In Version: pidgin 2.10.7
Clone Of:
Environment:
Last Closed: 2013-02-15 09:19:28 UTC
Embargoed:


Attachments (Terms of Use)
Local copy of (by Pidgin upstream) proposed patch to fix the CVE-2013-0271 issue (2.09 KB, patch)
2013-02-11 16:56 UTC, Jan Lieskovsky
no flags Details | Diff

Description Jan Lieskovsky 2013-02-11 16:48:38 UTC
A security flaw was found in the way MXit protocol plug-in of libPurple generated temporary file used for image data storage, when processing Imagestrip MXit command. A rogue server or remote attacker could use this flaw to specify a file name, which in a partial manner would be used to generate the final local path, used for storage of image data on the local disk, possibly leading to attacker's ability to overwrite local files accessible with the privileges of the user running the pidgin executable.

Upstream ticket:
[1] http://pidgin.im/news/security/?id=65

Comment 2 Jan Lieskovsky 2013-02-11 16:56:22 UTC
Created attachment 696213 [details]
Local copy of (by Pidgin upstream) proposed patch to fix the CVE-2013-0271 issue

Comment 3 Jan Lieskovsky 2013-02-11 16:57:25 UTC
This issue did NOT affect the versions of the pidgin package, as shipped with Red Hat Enterprise Linux 5 and 6.

--

This issue affects the versions of the pidgin package, as shipped with Fedora release of 16, 17, and 18.

Comment 4 Jan Lieskovsky 2013-02-11 17:34:04 UTC
Acknowledgements:

Red Hat would like to thank the Pidgin project for reporting this issue. Upstream acknowledges Chris Wysopal of Veracode as the original issue reporter.

Comment 5 Jan Lieskovsky 2013-02-11 17:34:48 UTC
The versions of pidgin shipped with Red Hat Enterprise Linux 5 and 6, do not 
support the MXIT_CMD_IMAGESTRIP command, hence they are not vulnerable to this flaw.


Statement:

Not vulnerable. This issue did not affect the versions of pidgin, as shipped with Red Hat Enterprise Linux 5 and 6.

Comment 7 Jan Lieskovsky 2013-02-13 16:26:57 UTC
Created pidgin tracking bugs for this issue

Affects: fedora-all [bug 910826]

Comment 8 Vincent Danen 2013-02-13 19:34:01 UTC
External References:

http://www.pidgin.im/news/security/?id=65


Note You need to log in before you can comment on or make changes to this bug.