CVE-2016-4323

Published: 23 June 2016

A directory traversal exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent from the server could potentially result in an overwrite of files. A malicious server or someone with access to the network traffic can provide an invalid filename for a splash image triggering the vulnerability.

Priority

Medium

CVSS 3 base score: 3.7

Status

Package Release Status
pidgin
Launchpad, Ubuntu, Debian
Upstream
Released (2.11.0-1)
Ubuntu 16.04 ESM (Xenial Xerus)
Released (1:2.10.12-0ubuntu5.1)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (1:2.10.9-0ubuntu3.3)
Patches:
Upstream: https://bitbucket.org/pidgin/main/commits/5fa3f2bc69d7