CVE-2013-6484Improper Input Validation in Pidgin

Severity
5.0MEDIUMNVD
EPSS
0.7%
top 28.35%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 6
Latest updateMay 17

Description

The STUN protocol implementation in libpurple in Pidgin before 2.10.8 allows remote STUN servers to cause a denial of service (out-of-bounds write operation and application crash) by triggering a socket read error.

CVSS vector

AV:N/AC:L/C:N/I:N/A:PExploitability: 10.0 | Impact: 2.9

Affected Packages3 packages

debiandebian/pidgin< pidgin 2.10.8-1 (bookworm)
Debianpidgin/pidgin< 2.10.8-1+3
NVDpidgin/pidgin2.10.7+52

🔴Vulnerability Details

2
GHSA
GHSA-r977-4g3r-3cw6: The STUN protocol implementation in libpurple in Pidgin before 22022-05-17
OSV
CVE-2013-6484: The STUN protocol implementation in libpurple in Pidgin before 22014-02-06

📋Vendor Advisories

3
Ubuntu
Pidgin vulnerabilities2014-02-06
Red Hat
pidgin: DoS via specially-crafted stun messages2014-01-28
Debian
CVE-2013-6484: pidgin - The STUN protocol implementation in libpurple in Pidgin before 2.10.8 allows rem...2013

💬Community

2
Bugzilla
CVE-2013-6483 CVE-2013-6482 CVE-2013-6481 CVE-2013-6487 CVE-2013-6485 CVE-2013-6484 CVE-2013-6489 CVE-2014-0020 CVE-2013-6477 CVE-2012-6152 CVE-2013-6478 CVE-2013-6479 CVE-2013-6490 pidgin: various fl2014-01-29
Bugzilla
CVE-2013-6484 pidgin: DoS via specially-crafted stun messages2014-01-24