Описание
Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg) parser in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a large Content-Length value, which triggers a buffer overflow.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 1:1.11.3-1 |
lucid | ignored | end of life |
precise | released | 1:1.11.1-1ubuntu0.1 |
quantal | released | 1:1.11.2-1ubuntu0.12.10.1 |
saucy | released | 1:1.11.2-1ubuntu1.1 |
upstream | released | 1:1.11.3-1 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | released | 1:2.10.9-0ubuntu1 |
lucid | ignored | end of life |
precise | released | 1:2.10.3-0ubuntu1.4 |
quantal | released | 1:2.10.6-0ubuntu2.3 |
saucy | released | 1:2.10.7-0ubuntu4.1.13.10.1 |
upstream | released | 2.10.8-1 |
Показывать по
EPSS
7.5 High
CVSS2
Связанные уязвимости
Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg) parser in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a large Content-Length value, which triggers a buffer overflow.
Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg) parser in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a large Content-Length value, which triggers a buffer overflow.
Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu ...
Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg) parser in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a large Content-Length value, which triggers a buffer overflow.
Уязвимость системы мгновенного обмена сообщениями Pidgin, позволяющая удаленному злоумышленнику вызвать отказ в обслуживании или выполнить произвольный код
EPSS
7.5 High
CVSS2