Описание
A buffer overflow vulnerability exists in the handling of the MXIT protocol Pidgin. Specially crafted data sent via the server could potentially result in a buffer overflow, potentially resulting in memory corruption. A malicious server or an unfiltered malicious user can send negative length values to trigger this vulnerability.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 1:2.10.12-0ubuntu6 |
| esm-apps/xenial | released | 1:2.10.12-0ubuntu5.1 |
| esm-infra-legacy/trusty | released | 1:2.10.9-0ubuntu3.3 |
| precise | released | 1:2.10.3-0ubuntu1.7 |
| trusty | released | 1:2.10.9-0ubuntu3.3 |
| trusty/esm | released | 1:2.10.9-0ubuntu3.3 |
| upstream | released | 2.11.0-1 |
| vivid/stable-phone-overlay | DNE | |
| vivid/ubuntu-core | DNE | |
| wily | released | 1:2.10.11-0ubuntu4.2 |
Показывать по
6.8 Medium
CVSS2
8.1 High
CVSS3
Связанные уязвимости
A buffer overflow vulnerability exists in the handling of the MXIT protocol Pidgin. Specially crafted data sent via the server could potentially result in a buffer overflow, potentially resulting in memory corruption. A malicious server or an unfiltered malicious user can send negative length values to trigger this vulnerability.
A buffer overflow vulnerability exists in the handling of the MXIT protocol Pidgin. Specially crafted data sent via the server could potentially result in a buffer overflow, potentially resulting in memory corruption. A malicious server or an unfiltered malicious user can send negative length values to trigger this vulnerability.
A buffer overflow vulnerability exists in the handling of the MXIT pro ...
A buffer overflow vulnerability exists in the handling of the MXIT protocol Pidgin. Specially crafted data sent via the server could potentially result in a buffer overflow, potentially resulting in memory corruption. A malicious server or an unfiltered malicious user can send negative length values to trigger this vulnerability.
6.8 Medium
CVSS2
8.1 High
CVSS3