CVE-2013-6490
Published: 5 February 2014
The SIMPLE protocol functionality in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a negative Content-Length header, which triggers a buffer overflow.
Priority
Status
Package | Release | Status |
---|---|---|
pidgin Launchpad, Ubuntu, Debian |
lucid |
Ignored
(end of life)
|
precise |
Released
(1:2.10.3-0ubuntu1.4)
|
|
quantal |
Released
(1:2.10.6-0ubuntu2.3)
|
|
saucy |
Released
(1:2.10.7-0ubuntu4.1.13.10.1)
|
|
upstream |
Released
(2.10.8)
|
|
Patches: upstream: http://hg.pidgin.im/pidgin/main/rev/6bd2dd10e5da |