Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2013-6487

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-06 Feb, 2014 | 16:00
Updated At-06 Aug, 2024 | 17:39
Rejected At-
Credits

Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg) parser in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a large Content-Length value, which triggers a buffer overflow.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:06 Feb, 2014 | 16:00
Updated At:06 Aug, 2024 | 17:39
Rejected At:
▼CVE Numbering Authority (CNA)

Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg) parser in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a large Content-Length value, which triggers a buffer overflow.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html
vendor-advisory
x_refsource_SUSE
http://advisories.mageia.org/MGASA-2014-0074.html
x_refsource_CONFIRM
https://security.gentoo.org/glsa/201508-02
vendor-advisory
x_refsource_GENTOO
https://rhn.redhat.com/errata/RHSA-2014-0139.html
vendor-advisory
x_refsource_REDHAT
http://www.ubuntu.com/usn/USN-2101-1
vendor-advisory
x_refsource_UBUNTU
http://hg.pidgin.im/pidgin/main/rev/ec15aa187aa0
x_refsource_CONFIRM
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128277.html
vendor-advisory
x_refsource_FEDORA
http://www.debian.org/security/2014/dsa-2859
vendor-advisory
x_refsource_DEBIAN
http://vrt-blog.snort.org/2014/01/vrt-2013-1001-cve-2013-6487-buffer.html
x_refsource_MISC
http://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html
vendor-advisory
x_refsource_SUSE
http://www.debian.org/security/2014/dsa-2852
vendor-advisory
x_refsource_DEBIAN
http://www.ubuntu.com/usn/USN-2100-1
vendor-advisory
x_refsource_UBUNTU
http://www.pidgin.im/news/security/?id=82
x_refsource_CONFIRM
http://libgadu.net/releases/1.11.3.html
x_refsource_MISC
http://www.mandriva.com/security/advisories?name=MDVSA-2014:039
vendor-advisory
x_refsource_MANDRIVA
http://www.securityfocus.com/bid/65188
vdb-entry
x_refsource_BID
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://advisories.mageia.org/MGASA-2014-0074.html
Resource:
x_refsource_CONFIRM
Hyperlink: https://security.gentoo.org/glsa/201508-02
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: https://rhn.redhat.com/errata/RHSA-2014-0139.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.ubuntu.com/usn/USN-2101-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://hg.pidgin.im/pidgin/main/rev/ec15aa187aa0
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128277.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://www.debian.org/security/2014/dsa-2859
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://vrt-blog.snort.org/2014/01/vrt-2013-1001-cve-2013-6487-buffer.html
Resource:
x_refsource_MISC
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://www.debian.org/security/2014/dsa-2852
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://www.ubuntu.com/usn/USN-2100-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://www.pidgin.im/news/security/?id=82
Resource:
x_refsource_CONFIRM
Hyperlink: http://libgadu.net/releases/1.11.3.html
Resource:
x_refsource_MISC
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2014:039
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://www.securityfocus.com/bid/65188
Resource:
vdb-entry
x_refsource_BID
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://advisories.mageia.org/MGASA-2014-0074.html
x_refsource_CONFIRM
x_transferred
https://security.gentoo.org/glsa/201508-02
vendor-advisory
x_refsource_GENTOO
x_transferred
https://rhn.redhat.com/errata/RHSA-2014-0139.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.ubuntu.com/usn/USN-2101-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://hg.pidgin.im/pidgin/main/rev/ec15aa187aa0
x_refsource_CONFIRM
x_transferred
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128277.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://www.debian.org/security/2014/dsa-2859
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://vrt-blog.snort.org/2014/01/vrt-2013-1001-cve-2013-6487-buffer.html
x_refsource_MISC
x_transferred
http://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://www.debian.org/security/2014/dsa-2852
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://www.ubuntu.com/usn/USN-2100-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://www.pidgin.im/news/security/?id=82
x_refsource_CONFIRM
x_transferred
http://libgadu.net/releases/1.11.3.html
x_refsource_MISC
x_transferred
http://www.mandriva.com/security/advisories?name=MDVSA-2014:039
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://www.securityfocus.com/bid/65188
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://advisories.mageia.org/MGASA-2014-0074.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://security.gentoo.org/glsa/201508-02
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: https://rhn.redhat.com/errata/RHSA-2014-0139.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.ubuntu.com/usn/USN-2101-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://hg.pidgin.im/pidgin/main/rev/ec15aa187aa0
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128277.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://www.debian.org/security/2014/dsa-2859
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://vrt-blog.snort.org/2014/01/vrt-2013-1001-cve-2013-6487-buffer.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://www.debian.org/security/2014/dsa-2852
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://www.ubuntu.com/usn/USN-2100-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://www.pidgin.im/news/security/?id=82
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://libgadu.net/releases/1.11.3.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2014:039
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://www.securityfocus.com/bid/65188
Resource:
vdb-entry
x_refsource_BID
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:06 Feb, 2014 | 17:00
Updated At:11 Apr, 2025 | 00:51

Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg) parser in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a large Content-Length value, which triggers a buffer overflow.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.07.5HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
Type: Primary
Version: 2.0
Base score: 7.5
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

Pidgin
pidgin
>>pidgin>>Versions up to 2.10.7(inclusive)
cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
Pidgin
pidgin
>>pidgin>>2.0.0
cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*
Pidgin
pidgin
>>pidgin>>2.0.1
cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*
Pidgin
pidgin
>>pidgin>>2.0.2
cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*
Pidgin
pidgin
>>pidgin>>2.0.2
cpe:2.3:a:pidgin:pidgin:2.0.2:*:linux:*:*:*:*:*
Pidgin
pidgin
>>pidgin>>2.1.0
cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*
Pidgin
pidgin
>>pidgin>>2.1.1
cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*
Pidgin
pidgin
>>pidgin>>2.10.0
cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*
Pidgin
pidgin
>>pidgin>>2.10.1
cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*
Pidgin
pidgin
>>pidgin>>2.10.2
cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*
Pidgin
pidgin
>>pidgin>>2.10.3
cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*
Pidgin
pidgin
>>pidgin>>2.10.4
cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*
Pidgin
pidgin
>>pidgin>>2.10.5
cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*
Pidgin
pidgin
>>pidgin>>2.10.6
cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-189Primarynvd@nist.gov
CWE ID: CWE-189
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://advisories.mageia.org/MGASA-2014-0074.htmlsecalert@redhat.com
N/A
http://hg.pidgin.im/pidgin/main/rev/ec15aa187aa0secalert@redhat.com
Vendor Advisory
http://libgadu.net/releases/1.11.3.htmlsecalert@redhat.com
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128277.htmlsecalert@redhat.com
N/A
http://lists.opensuse.org/opensuse-updates/2014-02/msg00039.htmlsecalert@redhat.com
N/A
http://lists.opensuse.org/opensuse-updates/2014-03/msg00005.htmlsecalert@redhat.com
N/A
http://vrt-blog.snort.org/2014/01/vrt-2013-1001-cve-2013-6487-buffer.htmlsecalert@redhat.com
N/A
http://www.debian.org/security/2014/dsa-2852secalert@redhat.com
N/A
http://www.debian.org/security/2014/dsa-2859secalert@redhat.com
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2014:039secalert@redhat.com
N/A
http://www.pidgin.im/news/security/?id=82secalert@redhat.com
Vendor Advisory
http://www.securityfocus.com/bid/65188secalert@redhat.com
N/A
http://www.ubuntu.com/usn/USN-2100-1secalert@redhat.com
N/A
http://www.ubuntu.com/usn/USN-2101-1secalert@redhat.com
N/A
https://rhn.redhat.com/errata/RHSA-2014-0139.htmlsecalert@redhat.com
N/A
https://security.gentoo.org/glsa/201508-02secalert@redhat.com
N/A
http://advisories.mageia.org/MGASA-2014-0074.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://hg.pidgin.im/pidgin/main/rev/ec15aa187aa0af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://libgadu.net/releases/1.11.3.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128277.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.opensuse.org/opensuse-updates/2014-02/msg00039.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.opensuse.org/opensuse-updates/2014-03/msg00005.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://vrt-blog.snort.org/2014/01/vrt-2013-1001-cve-2013-6487-buffer.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.debian.org/security/2014/dsa-2852af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.debian.org/security/2014/dsa-2859af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2014:039af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.pidgin.im/news/security/?id=82af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/bid/65188af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.ubuntu.com/usn/USN-2100-1af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.ubuntu.com/usn/USN-2101-1af854a3a-2127-422b-91ae-364da2661108
N/A
https://rhn.redhat.com/errata/RHSA-2014-0139.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
https://security.gentoo.org/glsa/201508-02af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://advisories.mageia.org/MGASA-2014-0074.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://hg.pidgin.im/pidgin/main/rev/ec15aa187aa0
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://libgadu.net/releases/1.11.3.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128277.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://vrt-blog.snort.org/2014/01/vrt-2013-1001-cve-2013-6487-buffer.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.debian.org/security/2014/dsa-2852
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.debian.org/security/2014/dsa-2859
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2014:039
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.pidgin.im/news/security/?id=82
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/65188
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/USN-2100-1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/USN-2101-1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://rhn.redhat.com/errata/RHSA-2014-0139.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://security.gentoo.org/glsa/201508-02
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://advisories.mageia.org/MGASA-2014-0074.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://hg.pidgin.im/pidgin/main/rev/ec15aa187aa0
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://libgadu.net/releases/1.11.3.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128277.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://vrt-blog.snort.org/2014/01/vrt-2013-1001-cve-2013-6487-buffer.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.debian.org/security/2014/dsa-2852
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.debian.org/security/2014/dsa-2859
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2014:039
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.pidgin.im/news/security/?id=82
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/65188
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/USN-2100-1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/USN-2101-1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://rhn.redhat.com/errata/RHSA-2014-0139.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://security.gentoo.org/glsa/201508-02
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

5Records found

CVE-2017-2640
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-1.00% / 76.08%
||
7 Day CHG~0.00%
Published-27 Jul, 2018 | 18:00
Updated-05 Aug, 2024 | 14:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An out-of-bounds write flaw was found in the way Pidgin before 2.12.0 processed XML content. A malicious remote server could potentially use this flaw to crash Pidgin or execute arbitrary code in the context of the pidgin process.

Action-Not Available
Vendor-Debian GNU/LinuxRed Hat, Inc.Pidgin
Product-enterprise_linux_serverdebian_linuxenterprise_linux_server_eusenterprise_linux_server_ausenterprise_linux_workstationpidginenterprise_linux_desktoppidgin
CWE ID-CWE-787
Out-of-bounds Write
CVE-2012-3374
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-3.69% / 87.45%
||
7 Day CHG~0.00%
Published-07 Jul, 2012 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in markup.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.5 allows remote attackers to execute arbitrary code via a crafted inline image in a message.

Action-Not Available
Vendor-n/aPidgin
Product-pidginn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2016-2368
Matching Score-8
Assigner-CERT/CC
ShareView Details
Matching Score-8
Assigner-CERT/CC
CVSS Score-8.1||HIGH
EPSS-1.71% / 81.58%
||
7 Day CHG~0.00%
Published-06 Jan, 2017 | 21:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple memory corruption vulnerabilities exist in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could result in multiple buffer overflows, potentially resulting in code execution or memory disclosure.

Action-Not Available
Vendor-Debian GNU/LinuxCanonical Ltd.Pidgin
Product-pidgindebian_linuxubuntu_linuxPidgin
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2016-1000030
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.78% / 72.69%
||
7 Day CHG~0.00%
Published-05 Sep, 2018 | 17:00
Updated-06 Aug, 2024 | 03:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Pidgin version <2.11.0 contains a vulnerability in X.509 Certificates imports specifically due to improper check of return values from gnutls_x509_crt_init() and gnutls_x509_crt_import() that can result in code execution. This attack appear to be exploitable via custom X.509 certificate from another client. This vulnerability appears to have been fixed in 2.11.0.

Action-Not Available
Vendor-n/aSUSEPidgin
Product-linux_enterprise_serverpidginn/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2012-2369
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-2.39% / 84.41%
||
7 Day CHG~0.00%
Published-23 May, 2012 | 20:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Format string vulnerability in the log_message_cb function in otr-plugin.c in the Off-the-Record Messaging (OTR) pidgin-otr plugin before 3.2.1 for Pidgin might allow remote attackers to execute arbitrary code via format string specifiers in data that generates a log message.

Action-Not Available
Vendor-cypherpunksn/aPidgin
Product-pidgin-otrpidginn/a
CWE ID-CWE-134
Use of Externally-Controlled Format String
Details not found