An out-of-bounds write vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could cause memory corruption resulting in code execution.
References
Link | Resource |
---|---|
http://www.debian.org/security/2016/dsa-3620 | Third Party Advisory |
http://www.pidgin.im/news/security/?id=104 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/91335 | Third Party Advisory VDB Entry |
http://www.talosintelligence.com/reports/TALOS-2016-0139/ | Technical Description Third Party Advisory |
http://www.ubuntu.com/usn/USN-3031-1 | Third Party Advisory |
https://security.gentoo.org/glsa/201701-38 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2017-01-06 21:59
Updated : 2017-03-30 01:59
NVD link : CVE-2016-2371
Mitre link : CVE-2016-2371
CVE.ORG link : CVE-2016-2371
JSON object : View
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
pidgin
- pidgin
CWE
CWE-787
Out-of-bounds Write