Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-1000030

Опубликовано: 21 июн. 2016
Источник: redhat
CVSS2: 2.6
EPSS Низкий

Описание

Pidgin version <2.11.0 contains a vulnerability in X.509 Certificates imports specifically due to improper check of return values from gnutls_x509_crt_init() and gnutls_x509_crt_import() that can result in code execution. This attack appear to be exploitable via custom X.509 certificate from another client. This vulnerability appears to have been fixed in 2.11.0.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5pidginNot affected
Red Hat Enterprise Linux 6pidginNot affected
Red Hat Enterprise Linux 7pidginNot affected

Показывать по

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=1348882pidgin: X.509 Certificates Improperly Imported

EPSS

Процентиль: 73%
0.00778
Низкий

2.6 Low

CVSS2

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 7 лет назад

Pidgin version <2.11.0 contains a vulnerability in X.509 Certificates imports specifically due to improper check of return values from gnutls_x509_crt_init() and gnutls_x509_crt_import() that can result in code execution. This attack appear to be exploitable via custom X.509 certificate from another client. This vulnerability appears to have been fixed in 2.11.0.

CVSS3: 9.8
nvd
больше 7 лет назад

Pidgin version <2.11.0 contains a vulnerability in X.509 Certificates imports specifically due to improper check of return values from gnutls_x509_crt_init() and gnutls_x509_crt_import() that can result in code execution. This attack appear to be exploitable via custom X.509 certificate from another client. This vulnerability appears to have been fixed in 2.11.0.

CVSS3: 9.8
debian
больше 7 лет назад

Pidgin version <2.11.0 contains a vulnerability in X.509 Certificates ...

CVSS3: 9.8
github
больше 3 лет назад

Pidgin version <2.11.0 contains a vulnerability in X.509 Certificates imports specifically due to improper check of return values from gnutls_x509_crt_init() and gnutls_x509_crt_import() that can result in code execution. This attack appear to be exploitable via custom X.509 certificate from another client. This vulnerability appears to have been fixed in 2.11.0.

EPSS

Процентиль: 73%
0.00778
Низкий

2.6 Low

CVSS2