CVE-2016-2368
Published: 23 June 2016
Multiple memory corruption vulnerabilities exist in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could result in multiple buffer overflows, potentially resulting in code execution or memory disclosure.
Priority
Status
Package | Release | Status |
---|---|---|
pidgin Launchpad, Ubuntu, Debian |
precise |
Released
(1:2.10.3-0ubuntu1.7)
|
trusty |
Released
(1:2.10.9-0ubuntu3.3)
|
|
upstream |
Released
(2.11.0-1)
|
|
wily |
Released
(1:2.10.11-0ubuntu4.2)
|
|
xenial |
Released
(1:2.10.12-0ubuntu5.1)
|
|
Patches: upstream: https://bitbucket.org/pidgin/main/commits/f6efc254e947 upstream: https://bitbucket.org/pidgin/main/commits/60f95045db42 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.1 |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |