Vulnerability Name: | CVE-2016-2374 (CCN-114375) | ||||||||||||||||||||||||
Assigned: | 2016-06-21 | ||||||||||||||||||||||||
Published: | 2016-06-21 | ||||||||||||||||||||||||
Updated: | 2017-03-30 | ||||||||||||||||||||||||
Summary: | An exploitable memory corruption vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT MultiMX message sent via the server can result in an out-of-bounds write leading to memory disclosure and code execution. | ||||||||||||||||||||||||
CVSS v3 Severity: | 8.1 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) 7.1 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R)
6.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:U/RC:R)
| ||||||||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||
Vulnerability Type: | CWE-125 CWE-200 | ||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2016-2374 Source: DEBIAN Type: Third Party Advisory DSA-3620 Source: CONFIRM Type: Patch, Vendor Advisory http://www.pidgin.im/news/security/?id=107 Source: BID Type: Third Party Advisory, VDB Entry 91335 Source: CCN Type: Talos Vulnerability Report TALOS-2016-0142 Pidgin MXIT MultiMX Message Code Execution Vulnerability Source: MISC Type: Technical Description, Third Party Advisory http://www.talosintelligence.com/reports/TALOS-2016-0142/ Source: UBUNTU Type: Third Party Advisory USN-3031-1 Source: XF Type: UNKNOWN pidgin-cve20162374-code-exec(114375) Source: GENTOO Type: UNKNOWN GLSA-201701-38 Source: CCN Type: Pidgin Web site Pidgin, the universal chat client | ||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration CCN 1: ![]() | ||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||
| |||||||||||||||||||||||||
BACK |