www: 3639d149: Updates to security news page.

datallah at pidgin.im datallah at pidgin.im
Wed Aug 27 12:20:28 EDT 2008


-----------------------------------------------------------------
Revision: 3639d149c6be3450f9511253ecd85a7c276ee24a
Ancestor: db773c19becaa07f3f0219702ed2f5e4014fe383
Author: datallah at pidgin.im
Date: 2008-08-27T16:17:50
Branch: im.pidgin.www
URL: http://d.pidgin.im/viewmtn/revision/info/3639d149c6be3450f9511253ecd85a7c276ee24a

Modified files:
        htdocs/news/security/index.php

ChangeLog: 

Updates to security news page.

-------------- next part --------------
============================================================
--- htdocs/news/security/index.php	769d914afbfbcf899eaab373308a8d121cf775ff
+++ htdocs/news/security/index.php	3fd71b3f495df860a09fdb2d900b281f13ae2066
@@ -266,6 +266,46 @@ $vulnerabilities = array(
 		"fix"          => "The affected function has been patched to fix the vulnerability.",
 		"fixedversion" => "2.2.2",
 		"discoveredby" => "Jeffrey Rosen"
+	),
+	array(
+		"title"        => "MSN malformed SLP message overflow",
+		"date"         => "July 2008",
+		"cve"          => "CVE-2008-2927",
+		"summary"      => "Malformed SLP messages can cause a buffer overflow",
+		"description"  => "Multiple integer overflows in the msn_slplink_process_msg functions in the MSN protocol handler in libpurple allow remote attackers to execute arbitrary code via a malformed SLP message.",
+		"fix"          => "The affected function has been patched to fix the vulnerability.",
+		"fixedversion" => "2.4.3",
+		"discoveredby" => "Anonymous (via TippingPoint's Zero Day Initiative)"
+	),
+	array(
+		"title"        => "MSN Remote file transfer filename DoS",
+		"date"         => "25 June 2008",
+		"cve"          => "CVE-2008-2955",
+		"summary"      => "MSN file transfers with specially crafted file names can cause libpurple to crash",
+		"description"  => "A remote MSN user can cause a denial of service (crash) by sending a file with a file with a filename containing invalid characters.  The local user must then accept the file transfer to trigger a double-free.",
+		"fix"          => "A fix was applied to ensure that the double-free didn't occur.",
+		"fixedversion" => "2.4.3",
+		"discoveredby" => "Juan Pablo Lopez Yacubian"
+	),
+	array(
+		"title"        => "Remote UPnP discovery DoS",
+		"date"         => "11 May 2007",
+		"cve"          => "CVE-2008-2957",
+		"summary"      => "A malicious process could pose as a UPnP server and cause libpurple to download excessive data.",
+		"description"  => "The UPnP functionality in libpurple allows remote attackers to trigger the download of arbitrary files and cause a denial of service (memory or disk consumption) via a UDP packet that specifies an arbitrary URL.",
+		"fix"          => "UPnP related downloads are limited to 128kB",
+		"fixedversion" => "2.5.0",
+		"discoveredby" => "Andrew Hunt and Christian Grothoff"
+	),
+	array(
+		"title"        => "NSS TLS/SSL Certificates not validated",
+		"date"         => "25 July 2008",
+		"cve"          => "CVE-2008-3532",
+		"summary"      => "No validation on SSL certificates was performed for NSS SSL",
+		"description"  => "The NSS SSL implementation in libpurple does not verify SSL certificates, which makes it easier for remote attackers to trick a user into accepting an invalid server certificate for a spoofed service.",
+		"fix"          => "SSL/TLS Certificates are now verified in the NSS implementation in libpurple.",
+		"fixedversion" => "2.5.0",
+		"discoveredby" => "Josh Triplett"
 	)
 );
 /*	Template for the unfortunate future


More information about the Commits mailing list