CVE-2013-6487
Publication date 3 February 2014
Last updated 24 July 2024
Ubuntu priority
Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg) parser in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a large Content-Length value, which triggers a buffer overflow.
Status
Package | Ubuntu Release | Status |
---|---|---|
libgadu | 13.10 saucy |
Fixed 1:1.11.2-1ubuntu1.1
|
12.10 quantal |
Fixed 1:1.11.2-1ubuntu0.12.10.1
|
|
12.04 LTS precise |
Fixed 1:1.11.1-1ubuntu0.1
|
|
10.04 LTS lucid | Ignored end of life | |
pidgin | 13.10 saucy |
Fixed 1:2.10.7-0ubuntu4.1.13.10.1
|
12.10 quantal |
Fixed 1:2.10.6-0ubuntu2.3
|
|
12.04 LTS precise |
Fixed 1:2.10.3-0ubuntu1.4
|
|
10.04 LTS lucid | Ignored end of life |
Patch details
Package | Patch details |
---|---|
pidgin |
References
Related Ubuntu Security Notices (USN)
- USN-2100-1
- Pidgin vulnerabilities
- 6 February 2014
- USN-2101-1
- libgadu vulnerability
- 10 February 2014