Vulnerability Name: | CVE-2016-1000030 (CCN-151785) | ||||||||||||||||||||
Assigned: | 2016-06-21 | ||||||||||||||||||||
Published: | 2016-06-21 | ||||||||||||||||||||
Updated: | 2018-11-14 | ||||||||||||||||||||
Summary: | Pidgin version <2.11.0 contains a vulnerability in X.509 Certificates imports specifically due to improper check of return values from gnutls_x509_crt_init() and gnutls_x509_crt_import() that can result in code execution. This attack appear to be exploitable via custom X.509 certificate from another client. This vulnerability appears to have been fixed in 2.11.0. | ||||||||||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
7.7 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||
Vulnerability Type: | CWE-295 | ||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2016-1000030 Source: CONFIRM Type: Third Party Advisory https://access.redhat.com/security/cve/cve-2016-1000030 Source: CONFIRM Type: Patch, Third Party Advisory https://bitbucket.org/pidgin/main/commits/d6fc1ce76ffe Source: XF Type: UNKNOWN pidgin-cve20161000030-code-exec(151785) Source: CCN Type: Pidgin Security Advisory X.509 Certificates Improperly Imported Source: CONFIRM Type: Vendor Advisory https://pidgin.im/news/security/?id=91 Source: GENTOO Type: Third Party Advisory GLSA-201701-38 Source: CONFIRM Type: Third Party Advisory https://www.suse.com/pt-br/security/cve/CVE-2016-1000030/ | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: ![]() | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |