what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Insomnia Security Vulnerability Advisory 110822.1

Insomnia Security Vulnerability Advisory 110822.1
Posted Aug 22, 2011
Authored by James Burton | Site insomniasec.com

Insomnia Security Vulnerability Advisory - An insecure URL handling vulnerability exists in Pidgin versions 2.9.0 and below that can be exploited to cause remote code execution. This vulnerability requires user interaction in the form of clicking a malicious crafted URL.

tags | advisory, remote, code execution
SHA-256 | 78f433609701f4f1da1ce29a348a9c690cd4095e97081d3ac07d88c61cd8c42f

Insomnia Security Vulnerability Advisory 110822.1

Change Mirror Download
___________________________________________________________________

Insomnia Security Vulnerability Advisory: ISVA-110822.1
___________________________________________________________________

Name: Pidgin IM Insecure URL Handling Remote Code Execution
Reported: 21 July 2011

Vendor Link:
http://www.pidgin.im

Affected Products:
Pidgin Instant Messaging Client <= 2.9.0

Original Advisory:
http://www.insomniasec.com/advisories/ISVA-110822.1.htm

Researcher:
James Burton, Insomnia Security
http://www.insomniasec.com
___________________________________________________________________


_______________

Description
_______________

Pidgin is an open source instant messaging client that allows users
to log in to accounts on multiple chat networks simultaneously.

An insecure URL handling vulnerability exists in Pidgin <= 2.9.0
that can be exploited to cause remote code execution.

This vulnerability requires user interaction in the form of clicking
a malicious crafted URL.

_______________

Details
_______________

Pidgin supports the use of URL handlers in IM sessions. The Windows build
passes URLs directly to the ShellExecute API where they are executed under
the context of the user running the application.

When passed through a file:// URL a malicious executable can be hosted
and executed off a remote WEBDAV/SMB share.

This vulnerability requires user interaction in the form of clicking a
crafted URL but Pidgins Insert -> Link function gives the option of adding
a description which masks the underlying link.

This makes the task of social engineering the target a trivial one.

This vulnerability has only been confirmed over Google-Talk though
exploitation over other chat networks may be possible.

_______________

Solution
_______________

Upgrade to Pidgin 2.10.0 from http://www.pidgin.im/
The Pidgin changelog can be found http://developer.pidgin.im/wiki/ChangeLog

_______________

Legals
_______________

The information is provided for research and educational purposes
only. Insomnia Security accepts no liability in any form whatsoever
for any direct or indirect damages associated with the use of this
information.

___________________________________________________________________

Insomnia Security Vulnerability Advisory: ISVA-110822.1
___________________________________________________________________
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close