Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2012-6152

Опубликовано: 06 фев. 2014
Источник: debian
EPSS Низкий

Описание

The Yahoo! protocol plugin in libpurple in Pidgin before 2.10.8 does not properly validate UTF-8 data, which allows remote attackers to cause a denial of service (application crash) via crafted byte sequences.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
pidginfixed2.10.8-1package
pidginend-of-lifesqueezepackage

EPSS

Процентиль: 77%
0.01102
Низкий

Связанные уязвимости

ubuntu
больше 11 лет назад

The Yahoo! protocol plugin in libpurple in Pidgin before 2.10.8 does not properly validate UTF-8 data, which allows remote attackers to cause a denial of service (application crash) via crafted byte sequences.

redhat
больше 11 лет назад

The Yahoo! protocol plugin in libpurple in Pidgin before 2.10.8 does not properly validate UTF-8 data, which allows remote attackers to cause a denial of service (application crash) via crafted byte sequences.

nvd
больше 11 лет назад

The Yahoo! protocol plugin in libpurple in Pidgin before 2.10.8 does not properly validate UTF-8 data, which allows remote attackers to cause a denial of service (application crash) via crafted byte sequences.

github
около 3 лет назад

The Yahoo! protocol plugin in libpurple in Pidgin before 2.10.8 does not properly validate UTF-8 data, which allows remote attackers to cause a denial of service (application crash) via crafted byte sequences.

oracle-oval
больше 11 лет назад

ELSA-2014-0139: pidgin security update (MODERATE)

EPSS

Процентиль: 77%
0.01102
Низкий