Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-2374

Опубликовано: 06 янв. 2017
Источник: debian
EPSS Низкий

Описание

An exploitable memory corruption vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT MultiMX message sent via the server can result in an out-of-bounds write leading to memory disclosure and code execution.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
pidginfixed2.11.0-1package

Примечания

  • http://www.talosintel.com/reports/TALOS-2016-0142/

  • http://www.pidgin.im/news/security/?id=107

  • https://bitbucket.org/pidgin/main/commits/f6c08d962618

EPSS

Процентиль: 86%
0.02781
Низкий

Связанные уязвимости

CVSS3: 8.1
ubuntu
около 9 лет назад

An exploitable memory corruption vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT MultiMX message sent via the server can result in an out-of-bounds write leading to memory disclosure and code execution.

CVSS3: 5.6
redhat
больше 9 лет назад

An exploitable memory corruption vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT MultiMX message sent via the server can result in an out-of-bounds write leading to memory disclosure and code execution.

CVSS3: 8.1
nvd
около 9 лет назад

An exploitable memory corruption vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT MultiMX message sent via the server can result in an out-of-bounds write leading to memory disclosure and code execution.

CVSS3: 8.1
github
больше 3 лет назад

An exploitable memory corruption vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT MultiMX message sent via the server can result in an out-of-bounds write leading to memory disclosure and code execution.

EPSS

Процентиль: 86%
0.02781
Низкий