---------------------------------------------------------------------- Follow Secunia on Twitter http://twitter.com/secunia ---------------------------------------------------------------------- TITLE: Pidgin MSN Custom Smileys File Disclosure Vulnerability SECUNIA ADVISORY ID: SA37953 VERIFY ADVISORY: http://secunia.com/advisories/37953/ DESCRIPTION: Fabian Yamaguchi has discovered a vulnerability in Pidgin, which can be exploited by malicious people to disclose sensitive information. The vulnerability is caused due to an error in the implementation of the custom smileys feature for MSN. This can be exploited to disclose the content of arbitrary files via an MSN emoticon request containing directory traversal sequences. Successful exploitation may require that at least one custom smiley is defined. The vulnerability is confirmed in version 2.6.4. Other versions may also be affected. SOLUTION: Delete the "custom_smiley" directory from the ".purple" settings directory. PROVIDED AND/OR DISCOVERED BY: Fabian 'fabs' Yamaguchi ORIGINAL ADVISORY: http://events.ccc.de/congress/2009/Fahrplan/attachments/1483_26c3_ipv4_fuckups.pdf ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------