An out-of-bounds write vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could cause memory corruption resulting in code execution.
References
Link | Resource |
---|---|
http://www.ubuntu.com/usn/USN-3031-1 | Third Party Advisory |
http://www.talosintelligence.com/reports/TALOS-2016-0139/ | Technical Description Third Party Advisory |
http://www.pidgin.im/news/security/?id=104 | Patch Vendor Advisory |
http://www.debian.org/security/2016/dsa-3620 | Third Party Advisory |
http://www.securityfocus.com/bid/91335 | Third Party Advisory VDB Entry |
https://security.gentoo.org/glsa/201701-38 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2017-01-06 13:59
Updated : 2017-03-29 18:59
NVD link : CVE-2016-2371
Mitre link : CVE-2016-2371
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
pidgin
- pidgin