CVE-2016-2371
Publication date 23 June 2016
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
An out-of-bounds write vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could cause memory corruption resulting in code execution.
Status
Package | Ubuntu Release | Status |
---|---|---|
pidgin | 16.04 LTS xenial |
Fixed 1:2.10.12-0ubuntu5.1
|
14.04 LTS trusty |
Fixed 1:2.10.9-0ubuntu3.3
|
|
Notes
seth-arnold
This patch doesn't enforce upper-limits; it seems insufficient to me.
mdeslaur
patch listed in upstream avisory is wrong, it is actually the fix for CVE-2016-2369
Patch details
Package | Patch details |
---|---|
pidgin |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.1 · High |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-3031-1
- Pidgin vulnerabilities
- 12 July 2016