Bug 991721 (CVE-2016-2379) - VUL-0: CVE-2016-2379: pidgin: hash password recovery
Summary: VUL-0: CVE-2016-2379: pidgin: hash password recovery
Status: RESOLVED INVALID
Alias: CVE-2016-2379
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P5 - None : Normal
Target Milestone: ---
Assignee: Felix Zhang
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/170379/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2016-08-02 13:53 UTC by Marcus Meissner
Modified: 2016-08-02 13:53 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Marcus Meissner 2016-08-02 13:53:09 UTC
CVE-2016-2379

https://www.pidgin.im/news/security/?id=95

Pidgin Security Advisory
Title	
Date	2016-06-21
CVE Name	CVE 2016-2379
Discovered By	Yves Younan of Cisco Talos
Description	An attacker who eavesdrops on a Mxit session captures the user's hashed password. The hashed password can be re-used to login as that user. (TALOS-CAN-0122)
Fixed in Version	
Fix	N/A. This is a fundamental problem with the Mxit protocol.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-2379
Comment 1 Marcus Meissner 2016-08-02 13:53:32 UTC
pidgin says it is a problem of the MXIT protocol and can not be fixed.