Multiple memory corruption vulnerabilities exist in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could result in multiple buffer overflows, potentially resulting in code execution or memory disclosure.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.debian.org/security/2016/dsa-3620 | Third Party Advisory | 
| http://www.pidgin.im/news/security/?id=101 | Patch Vendor Advisory | 
| http://www.securityfocus.com/bid/91335 | Third Party Advisory VDB Entry | 
| http://www.talosintelligence.com/reports/TALOS-2016-0136/ | Technical Description Third Party Advisory | 
| http://www.ubuntu.com/usn/USN-3031-1 | Third Party Advisory | 
| https://security.gentoo.org/glsa/201701-38 | 
Configurations
                    Configuration 1 (hide)
| 
 | 
Configuration 2 (hide)
| 
 | 
Configuration 3 (hide)
| 
 | 
History
                    No history.
Information
                Published : 2017-01-06 21:59
Updated : 2017-03-30 01:59
NVD link : CVE-2016-2368
Mitre link : CVE-2016-2368
CVE.ORG link : CVE-2016-2368
JSON object : View
Products Affected
                debian
- debian_linux
canonical
- ubuntu_linux
pidgin
- pidgin
CWE
                
                    
                        
                        CWE-119
                        
            Improper Restriction of Operations within the Bounds of a Memory Buffer
