Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-2380

Опубликовано: 21 июн. 2016
Источник: redhat
CVSS3: 3.1
CVSS2: 2.6

Описание

An information leak exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent to the server could potentially result in an out-of-bounds read. A user could be convinced to enter a particular string which would then get converted incorrectly and could lead to a potential out-of-bounds read.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5pidginWill not fix
Red Hat Enterprise Linux 6pidginWill not fix
Red Hat Enterprise Linux 7pidginWill not fix

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=1348856pidgin: MXIT mxit_convert_markup_tx Information Leak Vulnerability

3.1 Low

CVSS3

2.6 Low

CVSS2

Связанные уязвимости

CVSS3: 3.1
ubuntu
около 9 лет назад

An information leak exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent to the server could potentially result in an out-of-bounds read. A user could be convinced to enter a particular string which would then get converted incorrectly and could lead to a potential out-of-bounds read.

CVSS3: 3.1
nvd
около 9 лет назад

An information leak exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent to the server could potentially result in an out-of-bounds read. A user could be convinced to enter a particular string which would then get converted incorrectly and could lead to a potential out-of-bounds read.

CVSS3: 3.1
debian
около 9 лет назад

An information leak exists in the handling of the MXIT protocol in Pid ...

CVSS3: 3.1
github
больше 3 лет назад

An information leak exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent to the server could potentially result in an out-of-bounds read. A user could be convinced to enter a particular string which would then get converted incorrectly and could lead to a potential out-of-bounds read.

3.1 Low

CVSS3

2.6 Low

CVSS2