Ispravljen je novi sigurnosni nedostatak uočen u radu programskih paketa pidgin, finch i libpurple. Zlonamjerni korisnik može ga iskoristiti za izvršavanje proizvoljnog programskog koda.
Paket:
finch 2.x, libpurple 2.x, pidgin 2.x
Operacijski sustavi:
SUSE Linux Enterprise Desktop 10, SUSE Linux Enterprise Desktop 11
Kritičnost:
7.5
Problem:
pogreška u programskoj komponenti
Iskorištavanje:
udaljeno
Posljedica:
proizvoljno izvršavanje programskog koda
Rješenje:
programska zakrpa proizvođača
CVE:
CVE-2012-3374
Izvorni ID preporuke:
SUSE-SU-2012:0890-1
Izvor:
SUSE
Problem:
Propust je posljedica preljeva međuspremnika u datoteci "markup.c" u dodatku za MXit protokol.
Posljedica:
Udaljeni napadač može iskoristiti spomenuti nedostatak za pokretanje proizvoljnog programskog koda putem posebno oblikovane slike koja se nalazi u razini s tekstom poruke.
Rješenje:
Svim korisnicima se savjetuje korištenje službenih zakrpa.
SUSE Security Update: Security update for pidgin, finch and libpurple
______________________________________________________________________________
Announcement ID: SUSE-SU-2012:0890-1
Rating: important
References: #770304
Cross-References: CVE-2012-3374
Affected Products:
SUSE Linux Enterprise Software Development Kit 11 SP2
SUSE Linux Enterprise Software Development Kit 11 SP1
SUSE Linux Enterprise Desktop 11 SP2
SUSE Linux Enterprise Desktop 11 SP1
SUSE Linux Enterprise Desktop 10 SP4
SLE SDK 10 SP4
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update of pidgin fixes a stack-based buffer overflow
in the MXit protocol which could have potentially been
exploited by remote attackers to execute arbitrary code in
the context of the user running pidgin (CVE-2012-3374).
Security Issue reference:
* CVE-2012-3374
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3374
>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11 SP2:
zypper in -t patch sdksp1-finch-6534
- SUSE Linux Enterprise Software Development Kit 11 SP1:
zypper in -t patch sdksp1-finch-6534
- SUSE Linux Enterprise Desktop 11 SP2:
zypper in -t patch sledsp1-finch-6534
- SUSE Linux Enterprise Desktop 11 SP1:
zypper in -t patch sledsp1-finch-6534
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64
s390x x86_64):
finch-2.6.6-0.17.1
finch-devel-2.6.6-0.17.1
libpurple-2.6.6-0.17.1
libpurple-devel-2.6.6-0.17.1
libpurple-lang-2.6.6-0.17.1
pidgin-2.6.6-0.17.1
pidgin-devel-2.6.6-0.17.1
- SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64
s390x x86_64):
finch-2.6.6-0.17.1
finch-devel-2.6.6-0.17.1
libpurple-2.6.6-0.17.1
libpurple-devel-2.6.6-0.17.1
libpurple-lang-2.6.6-0.17.1
pidgin-2.6.6-0.17.1
pidgin-devel-2.6.6-0.17.1
- SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64):
finch-2.6.6-0.17.1
libpurple-2.6.6-0.17.1
libpurple-lang-2.6.6-0.17.1
libpurple-meanwhile-2.6.6-0.17.1
libpurple-tcl-2.6.6-0.17.1
pidgin-2.6.6-0.17.1
- SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64):
finch-2.6.6-0.17.1
libpurple-2.6.6-0.17.1
libpurple-lang-2.6.6-0.17.1
libpurple-meanwhile-2.6.6-0.17.1
libpurple-tcl-2.6.6-0.17.1
pidgin-2.6.6-0.17.1
- SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64):
finch-2.6.6-0.18.1
libpurple-2.6.6-0.18.1
pidgin-2.6.6-0.18.1
- SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64):
finch-2.6.6-0.18.1
finch-devel-2.6.6-0.18.1
libpurple-2.6.6-0.18.1
libpurple-devel-2.6.6-0.18.1
pidgin-2.6.6-0.18.1
pidgin-devel-2.6.6-0.18.1
References:
http://support.novell.com/security/cve/CVE-2012-3374.html
https://bugzilla.novell.com/770304
http://download.novell.com/patch/finder/?keywords=6cdbffccfb7e818b850e497dc8f94724
http://download.novell.com/patch/finder/?keywords=a738afec13eba5d4d2ab0d2b9a6f3416
--
To unsubscribe, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
For additional commands, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
Posljednje sigurnosne preporuke