Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-2378

Опубликовано: 21 июн. 2016
Источник: redhat
CVSS3: 5
CVSS2: 5.1

Описание

A buffer overflow vulnerability exists in the handling of the MXIT protocol Pidgin. Specially crafted data sent via the server could potentially result in a buffer overflow, potentially resulting in memory corruption. A malicious server or an unfiltered malicious user can send negative length values to trigger this vulnerability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5pidginWill not fix
Red Hat Enterprise Linux 6pidginWill not fix
Red Hat Enterprise Linux 7pidginWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-122
https://bugzilla.redhat.com/show_bug.cgi?id=1348854pidgin: MXIT get_utf8_string Code Execution Vulnerability

5 Medium

CVSS3

5.1 Medium

CVSS2

Связанные уязвимости

CVSS3: 8.1
ubuntu
около 9 лет назад

A buffer overflow vulnerability exists in the handling of the MXIT protocol Pidgin. Specially crafted data sent via the server could potentially result in a buffer overflow, potentially resulting in memory corruption. A malicious server or an unfiltered malicious user can send negative length values to trigger this vulnerability.

CVSS3: 8.1
nvd
около 9 лет назад

A buffer overflow vulnerability exists in the handling of the MXIT protocol Pidgin. Specially crafted data sent via the server could potentially result in a buffer overflow, potentially resulting in memory corruption. A malicious server or an unfiltered malicious user can send negative length values to trigger this vulnerability.

CVSS3: 8.1
debian
около 9 лет назад

A buffer overflow vulnerability exists in the handling of the MXIT pro ...

CVSS3: 8.1
github
больше 3 лет назад

A buffer overflow vulnerability exists in the handling of the MXIT protocol Pidgin. Specially crafted data sent via the server could potentially result in a buffer overflow, potentially resulting in memory corruption. A malicious server or an unfiltered malicious user can send negative length values to trigger this vulnerability.

5 Medium

CVSS3

5.1 Medium

CVSS2