Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-2378

Опубликовано: 06 янв. 2017
Источник: debian
EPSS Низкий

Описание

A buffer overflow vulnerability exists in the handling of the MXIT protocol Pidgin. Specially crafted data sent via the server could potentially result in a buffer overflow, potentially resulting in memory corruption. A malicious server or an unfiltered malicious user can send negative length values to trigger this vulnerability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
pidginfixed2.11.0-1package

Примечания

  • http://www.talosintel.com/reports/TALOS-2016-0120/

  • http://www.pidgin.im/news/security/?id=94

  • https://bitbucket.org/pidgin/main/commits/06278419c703

EPSS

Процентиль: 87%
0.03306
Низкий

Связанные уязвимости

CVSS3: 8.1
ubuntu
около 9 лет назад

A buffer overflow vulnerability exists in the handling of the MXIT protocol Pidgin. Specially crafted data sent via the server could potentially result in a buffer overflow, potentially resulting in memory corruption. A malicious server or an unfiltered malicious user can send negative length values to trigger this vulnerability.

CVSS3: 5
redhat
больше 9 лет назад

A buffer overflow vulnerability exists in the handling of the MXIT protocol Pidgin. Specially crafted data sent via the server could potentially result in a buffer overflow, potentially resulting in memory corruption. A malicious server or an unfiltered malicious user can send negative length values to trigger this vulnerability.

CVSS3: 8.1
nvd
около 9 лет назад

A buffer overflow vulnerability exists in the handling of the MXIT protocol Pidgin. Specially crafted data sent via the server could potentially result in a buffer overflow, potentially resulting in memory corruption. A malicious server or an unfiltered malicious user can send negative length values to trigger this vulnerability.

CVSS3: 8.1
github
больше 3 лет назад

A buffer overflow vulnerability exists in the handling of the MXIT protocol Pidgin. Specially crafted data sent via the server could potentially result in a buffer overflow, potentially resulting in memory corruption. A malicious server or an unfiltered malicious user can send negative length values to trigger this vulnerability.

EPSS

Процентиль: 87%
0.03306
Низкий