Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-2368

Опубликовано: 06 янв. 2017
Источник: debian
EPSS Низкий

Описание

Multiple memory corruption vulnerabilities exist in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could result in multiple buffer overflows, potentially resulting in code execution or memory disclosure.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
pidginfixed2.11.0-1package

Примечания

  • http://www.talosintel.com/reports/TALOS-2016-0136/

  • http://www.pidgin.im/news/security/?id=101

  • https://bitbucket.org/pidgin/main/commits/60f95045db42

  • https://bitbucket.org/pidgin/main/commits/f6efc254e947

EPSS

Процентиль: 90%
0.06022
Низкий

Связанные уязвимости

CVSS3: 8.1
ubuntu
около 9 лет назад

Multiple memory corruption vulnerabilities exist in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could result in multiple buffer overflows, potentially resulting in code execution or memory disclosure.

CVSS3: 5
redhat
больше 9 лет назад

Multiple memory corruption vulnerabilities exist in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could result in multiple buffer overflows, potentially resulting in code execution or memory disclosure.

CVSS3: 8.1
nvd
около 9 лет назад

Multiple memory corruption vulnerabilities exist in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could result in multiple buffer overflows, potentially resulting in code execution or memory disclosure.

CVSS3: 8.1
github
больше 3 лет назад

Multiple memory corruption vulnerabilities exist in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could result in multiple buffer overflows, potentially resulting in code execution or memory disclosure.

fstec
около 9 лет назад

Уязвимости программы мгновенного обмена сообщениями Pidgin, позволяющие нарушителю вызвать раскрытие памяти, а также внедрение произвольного кода

EPSS

Процентиль: 90%
0.06022
Низкий