<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">finch-2.11.0-4.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10432</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">finch-2.11.0-4.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the finch-2.11.0-4.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10432</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:10432</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-2694/</URL>
      <Description>SUSE CVE CVE-2009-2694 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-2703/</URL>
      <Description>SUSE CVE CVE-2009-2703 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-3026/</URL>
      <Description>SUSE CVE CVE-2009-3026 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-3083/</URL>
      <Description>SUSE CVE CVE-2009-3083 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-3084/</URL>
      <Description>SUSE CVE CVE-2009-3084 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-3085/</URL>
      <Description>SUSE CVE CVE-2009-3085 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-3615/</URL>
      <Description>SUSE CVE CVE-2009-3615 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-0013/</URL>
      <Description>SUSE CVE CVE-2010-0013 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-0277/</URL>
      <Description>SUSE CVE CVE-2010-0277 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-0420/</URL>
      <Description>SUSE CVE CVE-2010-0420 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-0423/</URL>
      <Description>SUSE CVE CVE-2010-0423 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-1624/</URL>
      <Description>SUSE CVE CVE-2010-1624 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-2528/</URL>
      <Description>SUSE CVE CVE-2010-2528 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-3711/</URL>
      <Description>SUSE CVE CVE-2010-3711 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-1091/</URL>
      <Description>SUSE CVE CVE-2011-1091 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-3594/</URL>
      <Description>SUSE CVE CVE-2011-3594 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-2214/</URL>
      <Description>SUSE CVE CVE-2012-2214 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-3374/</URL>
      <Description>SUSE CVE CVE-2012-3374 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-6152/</URL>
      <Description>SUSE CVE CVE-2012-6152 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-0271/</URL>
      <Description>SUSE CVE CVE-2013-0271 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-0272/</URL>
      <Description>SUSE CVE CVE-2013-0272 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-0273/</URL>
      <Description>SUSE CVE CVE-2013-0273 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-0274/</URL>
      <Description>SUSE CVE CVE-2013-0274 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-6477/</URL>
      <Description>SUSE CVE CVE-2013-6477 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-6478/</URL>
      <Description>SUSE CVE CVE-2013-6478 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-6479/</URL>
      <Description>SUSE CVE CVE-2013-6479 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-6481/</URL>
      <Description>SUSE CVE CVE-2013-6481 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-6482/</URL>
      <Description>SUSE CVE CVE-2013-6482 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-6483/</URL>
      <Description>SUSE CVE CVE-2013-6483 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-6484/</URL>
      <Description>SUSE CVE CVE-2013-6484 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-6485/</URL>
      <Description>SUSE CVE CVE-2013-6485 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-6486/</URL>
      <Description>SUSE CVE CVE-2013-6486 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-6487/</URL>
      <Description>SUSE CVE CVE-2013-6487 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0020/</URL>
      <Description>SUSE CVE CVE-2014-0020 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3694/</URL>
      <Description>SUSE CVE CVE-2014-3694 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3695/</URL>
      <Description>SUSE CVE CVE-2014-3695 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3696/</URL>
      <Description>SUSE CVE CVE-2014-3696 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3697/</URL>
      <Description>SUSE CVE CVE-2014-3697 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3698/</URL>
      <Description>SUSE CVE CVE-2014-3698 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="finch-2.11.0-4.1">
      <FullProductName ProductID="finch-2.11.0-4.1">finch-2.11.0-4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="finch-devel-2.11.0-4.1">
      <FullProductName ProductID="finch-devel-2.11.0-4.1">finch-devel-2.11.0-4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpurple-2.11.0-4.1">
      <FullProductName ProductID="libpurple-2.11.0-4.1">libpurple-2.11.0-4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpurple-branding-upstream-2.11.0-4.1">
      <FullProductName ProductID="libpurple-branding-upstream-2.11.0-4.1">libpurple-branding-upstream-2.11.0-4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpurple-devel-2.11.0-4.1">
      <FullProductName ProductID="libpurple-devel-2.11.0-4.1">libpurple-devel-2.11.0-4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpurple-lang-2.11.0-4.1">
      <FullProductName ProductID="libpurple-lang-2.11.0-4.1">libpurple-lang-2.11.0-4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpurple-plugin-sametime-2.11.0-4.1">
      <FullProductName ProductID="libpurple-plugin-sametime-2.11.0-4.1">libpurple-plugin-sametime-2.11.0-4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpurple-tcl-2.11.0-4.1">
      <FullProductName ProductID="libpurple-tcl-2.11.0-4.1">libpurple-tcl-2.11.0-4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="pidgin-2.11.0-4.1">
      <FullProductName ProductID="pidgin-2.11.0-4.1">pidgin-2.11.0-4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="pidgin-devel-2.11.0-4.1">
      <FullProductName ProductID="pidgin-devel-2.11.0-4.1">pidgin-devel-2.11.0-4.1</FullProductName>
    </Branch>
    <Relationship ProductReference="finch-2.11.0-4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:finch-2.11.0-4.1">finch-2.11.0-4.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="finch-devel-2.11.0-4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:finch-devel-2.11.0-4.1">finch-devel-2.11.0-4.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpurple-2.11.0-4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpurple-2.11.0-4.1">libpurple-2.11.0-4.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpurple-branding-upstream-2.11.0-4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1">libpurple-branding-upstream-2.11.0-4.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpurple-devel-2.11.0-4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1">libpurple-devel-2.11.0-4.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpurple-lang-2.11.0-4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1">libpurple-lang-2.11.0-4.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpurple-plugin-sametime-2.11.0-4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1">libpurple-plugin-sametime-2.11.0-4.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpurple-tcl-2.11.0-4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1">libpurple-tcl-2.11.0-4.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="pidgin-2.11.0-4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:pidgin-2.11.0-4.1">pidgin-2.11.0-4.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="pidgin-devel-2.11.0-4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1">pidgin-devel-2.11.0-4.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The msn_slplink_process_msg function in libpurple/protocols/msn/slplink.c in libpurple, as used in Pidgin (formerly Gaim) before 2.5.9 and Adium 1.3.5 and earlier, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) by sending multiple crafted SLP (aka MSNSLP) messages to trigger an overwrite of an arbitrary memory location.  NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-1376.</Note>
    </Notes>
    <CVE>CVE-2009-2694</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:finch-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:finch-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-2694.html</URL>
        <Description>CVE-2009-2694</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/527100</URL>
        <Description>SUSE Bug 527100</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libpurple/protocols/irc/msgs.c in the IRC protocol plugin in libpurple in Pidgin before 2.6.2 allows remote IRC servers to cause a denial of service (NULL pointer dereference and application crash) via a TOPIC message that lacks a topic string.</Note>
    </Notes>
    <CVE>CVE-2009-2703</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:finch-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:finch-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-2703.html</URL>
        <Description>CVE-2009-2703</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/537214</URL>
        <Description>SUSE Bug 537214</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">protocols/jabber/auth.c in libpurple in Pidgin 2.6.0, and possibly other versions, does not follow the "require TLS/SSL" preference when connecting to older Jabber servers that do not follow the XMPP specification, which causes libpurple to connect to the server without the expected encryption and allows remote attackers to sniff sessions.</Note>
    </Notes>
    <CVE>CVE-2009-3026</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:finch-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:finch-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-3026.html</URL>
        <Description>CVE-2009-3026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/535570</URL>
        <Description>SUSE Bug 535570</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/550170</URL>
        <Description>SUSE Bug 550170</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The msn_slp_sip_recv function in libpurple/protocols/msn/slp.c in the MSN protocol plugin in libpurple in Pidgin before 2.6.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an SLP invite message that lacks certain required fields, as demonstrated by a malformed message from a KMess client.</Note>
    </Notes>
    <CVE>CVE-2009-3083</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:finch-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:finch-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-3083.html</URL>
        <Description>CVE-2009-3083</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/536602</URL>
        <Description>SUSE Bug 536602</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/550170</URL>
        <Description>SUSE Bug 550170</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The msn_slp_process_msg function in libpurple/protocols/msn/slpcall.c in the MSN protocol plugin in libpurple 2.6.0 and 2.6.1, as used in Pidgin before 2.6.2, allows remote attackers to cause a denial of service (application crash) via a handwritten (aka Ink) message, related to an uninitialized variable and the incorrect "UTF16-LE" charset name.</Note>
    </Notes>
    <CVE>CVE-2009-3084</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:finch-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:finch-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-3084.html</URL>
        <Description>CVE-2009-3084</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/536602</URL>
        <Description>SUSE Bug 536602</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/550170</URL>
        <Description>SUSE Bug 550170</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The XMPP protocol plugin in libpurple in Pidgin before 2.6.2 does not properly handle an error IQ stanza during an attempted fetch of a custom smiley, which allows remote attackers to cause a denial of service (application crash) via XHTML-IM content with cid: images.</Note>
    </Notes>
    <CVE>CVE-2009-3085</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:finch-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:finch-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-3085.html</URL>
        <Description>CVE-2009-3085</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/536602</URL>
        <Description>SUSE Bug 536602</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/550170</URL>
        <Description>SUSE Bug 550170</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The OSCAR protocol plugin in libpurple in Pidgin before 2.6.3 and Adium before 1.3.7 allows remote attackers to cause a denial of service (application crash) via crafted contact-list data for (1) ICQ and possibly (2) AIM, as demonstrated by the SIM IM client.</Note>
    </Notes>
    <CVE>CVE-2009-3615</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:finch-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:finch-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-3615.html</URL>
        <Description>CVE-2009-3615</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/548072</URL>
        <Description>SUSE Bug 548072</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/550170</URL>
        <Description>SUSE Bug 550170</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Directory traversal vulnerability in slp.c in the MSN protocol plugin in libpurple in Pidgin 2.6.4 and Adium 1.3.8 allows remote attackers to read arbitrary files via a .. (dot dot) in an application/x-msnmsgrp2p MSN emoticon (aka custom smiley) request, a related issue to CVE-2004-0122. NOTE: it could be argued that this is resultant from a vulnerability in which an emoticon download request is processed even without a preceding text/x-mms-emoticon message that announced availability of the emoticon.</Note>
    </Notes>
    <CVE>CVE-2010-0013</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:finch-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:finch-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-0013.html</URL>
        <Description>CVE-2010-0013</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/567799</URL>
        <Description>SUSE Bug 567799</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/569616</URL>
        <Description>SUSE Bug 569616</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/581201</URL>
        <Description>SUSE Bug 581201</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">slp.c in the MSN protocol plugin in libpurple in Pidgin before 2.6.6, including 2.6.4, and Adium 1.3.8 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed MSNSLP INVITE request in an SLP message, a different issue than CVE-2010-0013.</Note>
    </Notes>
    <CVE>CVE-2010-0277</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:finch-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:finch-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-0277.html</URL>
        <Description>CVE-2010-0277</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/567799</URL>
        <Description>SUSE Bug 567799</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/569616</URL>
        <Description>SUSE Bug 569616</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/581201</URL>
        <Description>SUSE Bug 581201</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libpurple in Finch in Pidgin before 2.6.6, when an XMPP multi-user chat (MUC) room is used, does not properly parse nicknames containing &lt;br&gt; sequences, which allows remote attackers to cause a denial of service (application crash) via a crafted nickname.</Note>
    </Notes>
    <CVE>CVE-2010-0420</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:finch-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:finch-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-0420.html</URL>
        <Description>CVE-2010-0420</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/569616</URL>
        <Description>SUSE Bug 569616</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/581201</URL>
        <Description>SUSE Bug 581201</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">gtkimhtml.c in Pidgin before 2.6.6 allows remote attackers to cause a denial of service (CPU consumption and application hang) by sending many smileys in a (1) IM or (2) chat.</Note>
    </Notes>
    <CVE>CVE-2010-0423</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:finch-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:finch-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-0423.html</URL>
        <Description>CVE-2010-0423</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/569616</URL>
        <Description>SUSE Bug 569616</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/581201</URL>
        <Description>SUSE Bug 581201</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The msn_emoticon_msg function in slp.c in the MSN protocol plugin in libpurple in Pidgin before 2.7.0 allows remote authenticated users to cause a denial of service (NULL pointer dereference and application crash) via a custom emoticon in a malformed SLP message.</Note>
    </Notes>
    <CVE>CVE-2010-1624</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:finch-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:finch-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-1624.html</URL>
        <Description>CVE-2010-1624</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/604225</URL>
        <Description>SUSE Bug 604225</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The clientautoresp function in family_icbm.c in the oscar protocol plugin in libpurple in Pidgin before 2.7.2 allows remote authenticated users to cause a denial of service (NULL pointer dereference and application crash) via an X-Status message that lacks the expected end tag for a (1) desc or (2) title element.</Note>
    </Notes>
    <CVE>CVE-2010-2528</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:finch-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:finch-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-2528.html</URL>
        <Description>CVE-2010-2528</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/630965</URL>
        <Description>SUSE Bug 630965</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libpurple in Pidgin before 2.7.4 does not properly validate the return value of the purple_base64_decode function, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and application crash) via a crafted message, related to the plugins for MSN, MySpaceIM, XMPP, and Yahoo! and the NTLM authentication support.</Note>
    </Notes>
    <CVE>CVE-2010-3711</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:finch-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:finch-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-3711.html</URL>
        <Description>CVE-2010-3711</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/648273</URL>
        <Description>SUSE Bug 648273</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libymsg.c in the Yahoo! protocol plugin in libpurple in Pidgin 2.6.0 through 2.7.10 allows (1) remote authenticated users to cause a denial of service (NULL pointer dereference and application crash) via a malformed YMSG notification packet, and allows (2) remote Yahoo! servers to cause a denial of service (NULL pointer dereference and application crash) via a malformed YMSG SMS message.</Note>
    </Notes>
    <CVE>CVE-2011-1091</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:finch-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:finch-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-1091.html</URL>
        <Description>CVE-2011-1091</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/736189</URL>
        <Description>SUSE Bug 736189</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The g_markup_escape_text function in the SILC protocol plug-in in libpurple 2.10.0 and earlier, as used in Pidgin and possibly other products, allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with certain versions of glib2.</Note>
    </Notes>
    <CVE>CVE-2011-3594</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:finch-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:finch-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-3594.html</URL>
        <Description>CVE-2011-3594</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/722199</URL>
        <Description>SUSE Bug 722199</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/736161</URL>
        <Description>SUSE Bug 736161</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">proxy.c in libpurple in Pidgin before 2.10.4 does not properly handle canceled SOCKS5 connection attempts, which allows user-assisted remote authenticated users to cause a denial of service (application crash) via a sequence of XMPP file-transfer requests.</Note>
    </Notes>
    <CVE>CVE-2012-2214</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:finch-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:finch-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-2214.html</URL>
        <Description>CVE-2012-2214</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/760890</URL>
        <Description>SUSE Bug 760890</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in markup.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.5 allows remote attackers to execute arbitrary code via a crafted inline image in a message.</Note>
    </Notes>
    <CVE>CVE-2012-3374</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:finch-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:finch-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-3374.html</URL>
        <Description>CVE-2012-3374</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/770304</URL>
        <Description>SUSE Bug 770304</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Yahoo! protocol plugin in libpurple in Pidgin before 2.10.8 does not properly validate UTF-8 data, which allows remote attackers to cause a denial of service (application crash) via crafted byte sequences.</Note>
    </Notes>
    <CVE>CVE-2012-6152</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:finch-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:finch-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-6152.html</URL>
        <Description>CVE-2012-6152</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/861019</URL>
        <Description>SUSE Bug 861019</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The MXit protocol plugin in libpurple in Pidgin before 2.10.7 might allow remote attackers to create or overwrite files via a crafted (1) mxit or (2) mxit/imagestrips pathname.</Note>
    </Notes>
    <CVE>CVE-2013-0271</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:finch-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:finch-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-0271.html</URL>
        <Description>CVE-2013-0271</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/804742</URL>
        <Description>SUSE Bug 804742</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in http.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.7 allows remote servers to execute arbitrary code via a long HTTP header.</Note>
    </Notes>
    <CVE>CVE-2013-0272</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:finch-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:finch-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-0272.html</URL>
        <Description>CVE-2013-0272</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/804742</URL>
        <Description>SUSE Bug 804742</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">sametime.c in the Sametime protocol plugin in libpurple in Pidgin before 2.10.7 does not properly terminate long user IDs, which allows remote servers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2013-0273</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:finch-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:finch-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-0273.html</URL>
        <Description>CVE-2013-0273</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/804742</URL>
        <Description>SUSE Bug 804742</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">upnp.c in libpurple in Pidgin before 2.10.7 does not properly terminate long strings in UPnP responses, which allows remote attackers to cause a denial of service (application crash) by leveraging access to the local network.</Note>
    </Notes>
    <CVE>CVE-2013-0274</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:finch-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:finch-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-0274.html</URL>
        <Description>CVE-2013-0274</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/804742</URL>
        <Description>SUSE Bug 804742</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple integer signedness errors in libpurple in Pidgin before 2.10.8 allow remote attackers to cause a denial of service (application crash) via a crafted timestamp value in an XMPP message.</Note>
    </Notes>
    <CVE>CVE-2013-6477</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:finch-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:finch-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-6477.html</URL>
        <Description>CVE-2013-6477</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/861019</URL>
        <Description>SUSE Bug 861019</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">gtkimhtml.c in Pidgin before 2.10.8 does not properly interact with underlying library support for wide Pango layouts, which allows user-assisted remote attackers to cause a denial of service (application crash) via a long URL that is examined with a tooltip.</Note>
    </Notes>
    <CVE>CVE-2013-6478</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:finch-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:finch-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-6478.html</URL>
        <Description>CVE-2013-6478</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/861019</URL>
        <Description>SUSE Bug 861019</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">util.c in libpurple in Pidgin before 2.10.8 does not properly allocate memory for HTTP responses that are inconsistent with the Content-Length header, which allows remote HTTP servers to cause a denial of service (application crash) via a crafted response.</Note>
    </Notes>
    <CVE>CVE-2013-6479</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:finch-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:finch-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-6479.html</URL>
        <Description>CVE-2013-6479</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/861019</URL>
        <Description>SUSE Bug 861019</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libpurple/protocols/yahoo/libymsg.c in Pidgin before 2.10.8 allows remote attackers to cause a denial of service (crash) via a Yahoo! P2P message with a crafted length field, which triggers a buffer over-read.</Note>
    </Notes>
    <CVE>CVE-2013-6481</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:finch-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:finch-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-6481.html</URL>
        <Description>CVE-2013-6481</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/861019</URL>
        <Description>SUSE Bug 861019</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Pidgin before 2.10.8 allows remote MSN servers to cause a denial of service (NULL pointer dereference and crash) via a crafted (1) SOAP response, (2) OIM XML response, or (3) Content-Length header.</Note>
    </Notes>
    <CVE>CVE-2013-6482</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:finch-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:finch-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-6482.html</URL>
        <Description>CVE-2013-6482</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/861019</URL>
        <Description>SUSE Bug 861019</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The XMPP protocol plugin in libpurple in Pidgin before 2.10.8 does not properly determine whether the from address in an iq reply is consistent with the to address in an iq request, which allows remote attackers to spoof iq traffic or cause a denial of service (NULL pointer dereference and application crash) via a crafted reply.</Note>
    </Notes>
    <CVE>CVE-2013-6483</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:finch-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:finch-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-6483.html</URL>
        <Description>CVE-2013-6483</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/861019</URL>
        <Description>SUSE Bug 861019</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The STUN protocol implementation in libpurple in Pidgin before 2.10.8 allows remote STUN servers to cause a denial of service (out-of-bounds write operation and application crash) by triggering a socket read error.</Note>
    </Notes>
    <CVE>CVE-2013-6484</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:finch-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:finch-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-6484.html</URL>
        <Description>CVE-2013-6484</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/861019</URL>
        <Description>SUSE Bug 861019</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in util.c in libpurple in Pidgin before 2.10.8 allows remote HTTP servers to cause a denial of service (application crash) or possibly have unspecified other impact via an invalid chunk-size field in chunked transfer-coding data.</Note>
    </Notes>
    <CVE>CVE-2013-6485</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:finch-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:finch-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-6485.html</URL>
        <Description>CVE-2013-6485</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/861019</URL>
        <Description>SUSE Bug 861019</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">gtkutils.c in Pidgin before 2.10.8 on Windows allows user-assisted remote attackers to execute arbitrary programs via a message containing a file: URL that is improperly handled during construction of an explorer.exe command.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3185.</Note>
    </Notes>
    <CVE>CVE-2013-6486</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:finch-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:finch-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-6486.html</URL>
        <Description>CVE-2013-6486</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/861019</URL>
        <Description>SUSE Bug 861019</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg) parser in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a large Content-Length value, which triggers a buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2013-6487</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:finch-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:finch-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-6487.html</URL>
        <Description>CVE-2013-6487</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/861019</URL>
        <Description>SUSE Bug 861019</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/878540</URL>
        <Description>SUSE Bug 878540</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IRC protocol plugin in libpurple in Pidgin before 2.10.8 does not validate argument counts, which allows remote IRC servers to cause a denial of service (application crash) via a crafted message.</Note>
    </Notes>
    <CVE>CVE-2014-0020</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:finch-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:finch-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0020.html</URL>
        <Description>CVE-2014-0020</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/861019</URL>
        <Description>SUSE Bug 861019</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The (1) bundled GnuTLS SSL/TLS plugin and the (2) bundled OpenSSL SSL/TLS plugin in libpurple in Pidgin before 2.10.10 do not properly consider the Basic Constraints extension during verification of X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.</Note>
    </Notes>
    <CVE>CVE-2014-3694</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:finch-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:finch-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3694.html</URL>
        <Description>CVE-2014-3694</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/902495</URL>
        <Description>SUSE Bug 902495</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">markup.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.10 allows remote servers to cause a denial of service (application crash) via a large length value in an emoticon response.</Note>
    </Notes>
    <CVE>CVE-2014-3695</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:finch-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:finch-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3695.html</URL>
        <Description>CVE-2014-3695</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/902409</URL>
        <Description>SUSE Bug 902409</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">nmevent.c in the Novell GroupWise protocol plugin in libpurple in Pidgin before 2.10.10 allows remote servers to cause a denial of service (application crash) via a crafted server message that triggers a large memory allocation.</Note>
    </Notes>
    <CVE>CVE-2014-3696</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:finch-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:finch-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3696.html</URL>
        <Description>CVE-2014-3696</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/902410</URL>
        <Description>SUSE Bug 902410</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Absolute path traversal vulnerability in the untar_block function in win32/untar.c in Pidgin before 2.10.10 on Windows allows remote attackers to write to arbitrary files via a drive name in a tar archive of a smiley theme.</Note>
    </Notes>
    <CVE>CVE-2014-3697</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:finch-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:finch-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3697.html</URL>
        <Description>CVE-2014-3697</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The jabber_idn_validate function in jutil.c in the Jabber protocol plugin in libpurple in Pidgin before 2.10.10 allows remote attackers to obtain sensitive information from process memory via a crafted XMPP message.</Note>
    </Notes>
    <CVE>CVE-2014-3698</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:finch-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:finch-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-2.11.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3698.html</URL>
        <Description>CVE-2014-3698</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/902408</URL>
        <Description>SUSE Bug 902408</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
