CVE-2010-0013

Directory traversal vulnerability in slp.c in the MSN protocol plugin in libpurple in Pidgin 2.6.4 and Adium 1.3.8 allows remote attackers to read arbitrary files via a .. (dot dot) in an application/x-msnmsgrp2p MSN emoticon (aka custom smiley) request, a related issue to CVE-2004-0122. NOTE: it could be argued that this is resultant from a vulnerability in which an emoticon download request is processed even without a preceding text/x-mms-emoticon message that announced availability of the emoticon.
References
Link Resource
http://d.pidgin.im/viewmtn/revision/info/3d02401cf232459fc80c0837d31e05fae7ae5467 Broken Link
http://d.pidgin.im/viewmtn/revision/info/4be2df4f72bd8a55cdae7f2554b73342a497c92f Broken Link
http://d.pidgin.im/viewmtn/revision/info/c64a1adc8bda2b4aeaae1f273541afbc4f71b810 Broken Link
http://developer.pidgin.im/viewmtn/revision/diff/3d02401cf232459fc80c0837d31e05fae7ae5467/with/c64a1adc8bda2b4aeaae1f273541afbc4f71b810/libpurple/protocols/msn/slp.c Broken Link
http://events.ccc.de/congress/2009/Fahrplan/events/3596.en.html Product
http://lists.fedoraproject.org/pipermail/package-announce/2010-January/033771.html Mailing List
http://lists.fedoraproject.org/pipermail/package-announce/2010-January/033848.html Mailing List
http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html Mailing List
http://secunia.com/advisories/37953 Broken Link Vendor Advisory
http://secunia.com/advisories/37954 Broken Link Vendor Advisory
http://secunia.com/advisories/37961 Broken Link
http://secunia.com/advisories/38915 Broken Link
http://sunsolve.sun.com/search/document.do?assetkey=1-66-277450-1 Broken Link
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1022203.1-1 Broken Link
http://www.mandriva.com/security/advisories?name=MDVSA-2010:085 Broken Link
http://www.openwall.com/lists/oss-security/2010/01/02/1 Mailing List Patch
http://www.openwall.com/lists/oss-security/2010/01/07/1 Mailing List
http://www.openwall.com/lists/oss-security/2010/01/07/2 Mailing List
http://www.vupen.com/english/advisories/2009/3662 Permissions Required Vendor Advisory
http://www.vupen.com/english/advisories/2009/3663 Permissions Required Vendor Advisory
http://www.vupen.com/english/advisories/2010/1020 Permissions Required
https://bugzilla.redhat.com/show_bug.cgi?id=552483 Issue Tracking Patch
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10333 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17620 Broken Link
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:adium:adium:1.3.8:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:opensuse:opensuse:*:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise:11.0:-:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:-:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*

History

26 Jan 2024, 17:47

Type Values Removed Values Added
CPE cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:*:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise:11.0:-:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:-:*:*:*
cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*
First Time Redhat enterprise Linux
Opensuse opensuse
Redhat
Suse linux Enterprise
Suse linux Enterprise Server
Fedoraproject fedora
Opensuse
Fedoraproject
Suse
CVSS v2 : 5.0
v3 : unknown
v2 : 5.0
v3 : 7.5
References () http://d.pidgin.im/viewmtn/revision/info/3d02401cf232459fc80c0837d31e05fae7ae5467 - () http://d.pidgin.im/viewmtn/revision/info/3d02401cf232459fc80c0837d31e05fae7ae5467 - Broken Link
References () http://d.pidgin.im/viewmtn/revision/info/4be2df4f72bd8a55cdae7f2554b73342a497c92f - () http://d.pidgin.im/viewmtn/revision/info/4be2df4f72bd8a55cdae7f2554b73342a497c92f - Broken Link
References () http://d.pidgin.im/viewmtn/revision/info/c64a1adc8bda2b4aeaae1f273541afbc4f71b810 - () http://d.pidgin.im/viewmtn/revision/info/c64a1adc8bda2b4aeaae1f273541afbc4f71b810 - Broken Link
References () http://developer.pidgin.im/viewmtn/revision/diff/3d02401cf232459fc80c0837d31e05fae7ae5467/with/c64a1adc8bda2b4aeaae1f273541afbc4f71b810/libpurple/protocols/msn/slp.c - () http://developer.pidgin.im/viewmtn/revision/diff/3d02401cf232459fc80c0837d31e05fae7ae5467/with/c64a1adc8bda2b4aeaae1f273541afbc4f71b810/libpurple/protocols/msn/slp.c - Broken Link
References () http://events.ccc.de/congress/2009/Fahrplan/events/3596.en.html - () http://events.ccc.de/congress/2009/Fahrplan/events/3596.en.html - Product
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-January/033771.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-January/033771.html - Mailing List
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-January/033848.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-January/033848.html - Mailing List
References () http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html - () http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html - Mailing List
References () http://secunia.com/advisories/37953 - Vendor Advisory () http://secunia.com/advisories/37953 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/37954 - Vendor Advisory () http://secunia.com/advisories/37954 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/37961 - () http://secunia.com/advisories/37961 - Broken Link
References () http://secunia.com/advisories/38915 - () http://secunia.com/advisories/38915 - Broken Link
References () http://sunsolve.sun.com/search/document.do?assetkey=1-66-277450-1 - () http://sunsolve.sun.com/search/document.do?assetkey=1-66-277450-1 - Broken Link
References () http://sunsolve.sun.com/search/document.do?assetkey=1-77-1022203.1-1 - () http://sunsolve.sun.com/search/document.do?assetkey=1-77-1022203.1-1 - Broken Link
References () http://www.mandriva.com/security/advisories?name=MDVSA-2010:085 - () http://www.mandriva.com/security/advisories?name=MDVSA-2010:085 - Broken Link
References () http://www.openwall.com/lists/oss-security/2010/01/02/1 - () http://www.openwall.com/lists/oss-security/2010/01/02/1 - Mailing List, Patch
References () http://www.openwall.com/lists/oss-security/2010/01/07/1 - () http://www.openwall.com/lists/oss-security/2010/01/07/1 - Mailing List
References () http://www.openwall.com/lists/oss-security/2010/01/07/2 - () http://www.openwall.com/lists/oss-security/2010/01/07/2 - Mailing List
References () http://www.vupen.com/english/advisories/2009/3662 - Vendor Advisory () http://www.vupen.com/english/advisories/2009/3662 - Permissions Required, Vendor Advisory
References () http://www.vupen.com/english/advisories/2009/3663 - Vendor Advisory () http://www.vupen.com/english/advisories/2009/3663 - Permissions Required, Vendor Advisory
References () http://www.vupen.com/english/advisories/2010/1020 - () http://www.vupen.com/english/advisories/2010/1020 - Permissions Required
References () https://bugzilla.redhat.com/show_bug.cgi?id=552483 - () https://bugzilla.redhat.com/show_bug.cgi?id=552483 - Issue Tracking, Patch
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10333 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10333 - Broken Link
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17620 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17620 - Broken Link

07 Nov 2023, 02:04

Type Values Removed Values Added
Summary Directory traversal vulnerability in slp.c in the MSN protocol plugin in libpurple in Pidgin 2.6.4 and Adium 1.3.8 allows remote attackers to read arbitrary files via a .. (dot dot) in an application/x-msnmsgrp2p MSN emoticon (aka custom smiley) request, a related issue to CVE-2004-0122. NOTE: it could be argued that this is resultant from a vulnerability in which an emoticon download request is processed even without a preceding text/x-mms-emoticon message that announced availability of the emoticon. Directory traversal vulnerability in slp.c in the MSN protocol plugin in libpurple in Pidgin 2.6.4 and Adium 1.3.8 allows remote attackers to read arbitrary files via a .. (dot dot) in an application/x-msnmsgrp2p MSN emoticon (aka custom smiley) request, a related issue to CVE-2004-0122. NOTE: it could be argued that this is resultant from a vulnerability in which an emoticon download request is processed even without a preceding text/x-mms-emoticon message that announced availability of the emoticon.

13 Feb 2023, 02:21

Type Values Removed Values Added
Summary Directory traversal vulnerability in slp.c in the MSN protocol plugin in libpurple in Pidgin 2.6.4 and Adium 1.3.8 allows remote attackers to read arbitrary files via a .. (dot dot) in an application/x-msnmsgrp2p MSN emoticon (aka custom smiley) request, a related issue to CVE-2004-0122. NOTE: it could be argued that this is resultant from a vulnerability in which an emoticon download request is processed even without a preceding text/x-mms-emoticon message that announced availability of the emoticon. Directory traversal vulnerability in slp.c in the MSN protocol plugin in libpurple in Pidgin 2.6.4 and Adium 1.3.8 allows remote attackers to read arbitrary files via a .. (dot dot) in an application/x-msnmsgrp2p MSN emoticon (aka custom smiley) request, a related issue to CVE-2004-0122. NOTE: it could be argued that this is resultant from a vulnerability in which an emoticon download request is processed even without a preceding text/x-mms-emoticon message that announced availability of the emoticon.

Information

Published : 2010-01-09 18:30

Updated : 2024-01-26 17:47


NVD link : CVE-2010-0013

Mitre link : CVE-2010-0013

CVE.ORG link : CVE-2010-0013


JSON object : View

Products Affected

suse

  • linux_enterprise
  • linux_enterprise_server

adium

  • adium

opensuse

  • opensuse

pidgin

  • pidgin

redhat

  • enterprise_linux

fedoraproject

  • fedora
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')