A directory traversal exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent from the server could potentially result in an overwrite of files. A malicious server or someone with access to the network traffic can provide an invalid filename for a splash image triggering the vulnerability.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "1:2.10.9-0ubuntu3.3", "binary_name": "finch" }, { "binary_version": "1:2.10.9-0ubuntu3.3", "binary_name": "finch-dev" }, { "binary_version": "1:2.10.9-0ubuntu3.3", "binary_name": "libpurple-bin" }, { "binary_version": "1:2.10.9-0ubuntu3.3", "binary_name": "libpurple-dev" }, { "binary_version": "1:2.10.9-0ubuntu3.3", "binary_name": "libpurple0" }, { "binary_version": "1:2.10.9-0ubuntu3.3", "binary_name": "pidgin" }, { "binary_version": "1:2.10.9-0ubuntu3.3", "binary_name": "pidgin-data" }, { "binary_version": "1:2.10.9-0ubuntu3.3", "binary_name": "pidgin-dev" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "1:2.10.12-0ubuntu5.1", "binary_name": "finch" }, { "binary_version": "1:2.10.12-0ubuntu5.1", "binary_name": "finch-dev" }, { "binary_version": "1:2.10.12-0ubuntu5.1", "binary_name": "libpurple-bin" }, { "binary_version": "1:2.10.12-0ubuntu5.1", "binary_name": "libpurple-dev" }, { "binary_version": "1:2.10.12-0ubuntu5.1", "binary_name": "libpurple0" }, { "binary_version": "1:2.10.12-0ubuntu5.1", "binary_name": "pidgin" }, { "binary_version": "1:2.10.12-0ubuntu5.1", "binary_name": "pidgin-data" }, { "binary_version": "1:2.10.12-0ubuntu5.1", "binary_name": "pidgin-dev" } ] }