Absolute path traversal vulnerability in the untar_block function in win32/untar.c in Pidgin before 2.10.10 on Windows allows remote attackers to write to arbitrary files via a drive name in a tar archive of a smiley theme.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://pidgin.im/news/security/?id=89 | patch vendor advisory |
http://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html | vendor advisory |
http://lists.opensuse.org/opensuse-updates/2014-11/msg00037.html | vendor advisory |
http://hg.pidgin.im/pidgin/main/rev/68b8eb10977f | patch |