CVE-2016-2378

Published: 23 June 2016

A buffer overflow vulnerability exists in the handling of the MXIT protocol Pidgin. Specially crafted data sent via the server could potentially result in a buffer overflow, potentially resulting in memory corruption. A malicious server or an unfiltered malicious user can send negative length values to trigger this vulnerability.

Priority

Medium

CVSS 3 base score: 8.1

Status

Package Release Status
pidgin
Launchpad, Ubuntu, Debian
Upstream
Released (2.11.0-1)
Ubuntu 16.04 LTS (Xenial Xerus)
Released (1:2.10.12-0ubuntu5.1)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (1:2.10.9-0ubuntu3.3)
Patches:
Upstream: https://bitbucket.org/pidgin/main/commits/06278419c703