A severe vulnerability has been disclosed in libpurple, the library used in the development of a number of popular instant messaging clients, includin
A severe vulnerability has been disclosed in libpurple, the library used in the development of a number of popular instant messaging clients, including Adium for the macOS platform.
Adium 184.108.40.206 is vulnerable and can be exploited to run arbitrary code remotely. A researcher who goes by the handle Erythronium submitted a post on March 15 to the Adium developers mailing list about the issue. While there’s been some discussion of a fix for CVE-2017-2640, no advisory or patches have been released.
In the meantime, Erythronium told Threatpost that libpurple and Adium should no longer be used.
“Unless the [Adium] dev team comes out with an advisory about this issue, a serious apology, a completely solid story about how they plan to handle future vulnerabilities in their codebase and its dependencies, and a way for people to reproduce their builds without depending on a creepy binary blob of libpurple, people should simply stop using it,” the researcher said. “It’s also very arguable that people should stop using libpurple completely, since it also lacks strong security practices in its development.”
A request for comment from two members of the Adium team was not returned in time for publication.
“Adium’s build process documentation does not seem to include steps for upgrading or rebuilding libpurple, and the copy of libpurple checked into Adium’s open-source repository as a binary blob of unknown provenance,” Erythronium wrote in a post to the Full Disclosure mailing list.
Adium is a freely available IM client for the Apple platform, and users may connect a number of other IM networks to it, including AIM, Google Talk, Yahoo Messenger and others. It’s written using the Cocoa API in macOS, and also supports Off the Record (OTR) encryption over XMPP.
Libpurple is used in a number of IM programs, including Pidgin on Windows Linux and UNIX builds and Finch, a text-based IM program for Linux and UNIX.
The vulnerability is an out-of-bounds write flaw that happens when invalid XML is sent by an attacker, Pidgin said in an advisory; this was addressed in version 2.12.0.
“Successfully exploiting this issue may allow an attacker to cause a denial-of-service condition, execute arbitrary code or perform unauthorized actions,” said a SecurityFocus advisory.
The use of messaging apps that support encryption have been encouraged since the Snowden disclosures and other challenges to secure communication such as Apple vs. FBI. Adium specifically was included in a Privacy Pack recommended by the Electronic Frontier Foundation in the months following the Snowden leaks. The pack was a collection of tools for privacy conscious users, and included the Tor browser, encryption extensions for browsers, HTTPS Everywhere, and Pidgin and Adium for encrypted chats.