CVE-2013-6487 — Heap-based Buffer Overflow in Pidgin
Severity
7.5HIGHNVD
EPSS
3.9%
top 11.70%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 6
Latest updateMay 17
Description
Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg) parser in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a large Content-Length value, which triggers a buffer overflow.
CVSS vector
AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4
Affected Packages5 packages
🔴Vulnerability Details
2📋Vendor Advisories
4🕵️Threat Intelligence
4💬Community
3Bugzilla▶
CVE-2013-6487 libgadu: pidgin: Heap-based buffer overflow in Gadu-Gadu protocol plugin [fedora-all]↗2014-02-03
Bugzilla▶
CVE-2013-6483 CVE-2013-6482 CVE-2013-6481 CVE-2013-6487 CVE-2013-6485 CVE-2013-6484 CVE-2013-6489 CVE-2014-0020 CVE-2013-6477 CVE-2012-6152 CVE-2013-6478 CVE-2013-6479 CVE-2013-6490 pidgin: various fl↗2014-01-29