Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-2365

Опубликовано: 21 июн. 2016
Источник: redhat
CVSS3: 3.7
CVSS2: 2.6

Описание

A denial of service vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in a null pointer dereference. A malicious server or an attacker who intercepts the network traffic can send invalid data to trigger this vulnerability and cause a crash.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5pidginWill not fix
Red Hat Enterprise Linux 6pidginWill not fix
Red Hat Enterprise Linux 7pidginWill not fix

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-476
https://bugzilla.redhat.com/show_bug.cgi?id=1348858pidgin: MXIT Markup Command Denial of Service Vulnerability

3.7 Low

CVSS3

2.6 Low

CVSS2

Связанные уязвимости

CVSS3: 5.9
ubuntu
около 9 лет назад

A denial of service vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in a null pointer dereference. A malicious server or an attacker who intercepts the network traffic can send invalid data to trigger this vulnerability and cause a crash.

CVSS3: 5.9
nvd
около 9 лет назад

A denial of service vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in a null pointer dereference. A malicious server or an attacker who intercepts the network traffic can send invalid data to trigger this vulnerability and cause a crash.

CVSS3: 5.9
debian
около 9 лет назад

A denial of service vulnerability exists in the handling of the MXIT p ...

CVSS3: 5.9
github
больше 3 лет назад

A denial of service vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in a null pointer dereference. A malicious server or an attacker who intercepts the network traffic can send invalid data to trigger this vulnerability and cause a crash.

3.7 Low

CVSS3

2.6 Low

CVSS2