Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-2374

Опубликовано: 21 июн. 2016
Источник: redhat
CVSS3: 5.6
CVSS2: 5.1
EPSS Низкий

Описание

An exploitable memory corruption vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT MultiMX message sent via the server can result in an out-of-bounds write leading to memory disclosure and code execution.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5pidginWill not fix
Red Hat Enterprise Linux 6pidginWill not fix
Red Hat Enterprise Linux 7pidginWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=1348878pidgin: MXIT MultiMX Message Code Execution Vulnerability

EPSS

Процентиль: 86%
0.02781
Низкий

5.6 Medium

CVSS3

5.1 Medium

CVSS2

Связанные уязвимости

CVSS3: 8.1
ubuntu
около 9 лет назад

An exploitable memory corruption vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT MultiMX message sent via the server can result in an out-of-bounds write leading to memory disclosure and code execution.

CVSS3: 8.1
nvd
около 9 лет назад

An exploitable memory corruption vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT MultiMX message sent via the server can result in an out-of-bounds write leading to memory disclosure and code execution.

CVSS3: 8.1
debian
около 9 лет назад

An exploitable memory corruption vulnerability exists in the handling ...

CVSS3: 8.1
github
больше 3 лет назад

An exploitable memory corruption vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT MultiMX message sent via the server can result in an out-of-bounds write leading to memory disclosure and code execution.

EPSS

Процентиль: 86%
0.02781
Низкий

5.6 Medium

CVSS3

5.1 Medium

CVSS2