CVE-2016-2376Improper Restriction of Operations within the Bounds of a Memory Buffer in Pidgin

Severity
8.1HIGHNVD
EPSS
6.9%
top 8.61%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 6
Latest updateMay 17

Description

A buffer overflow vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent from the server could potentially result in arbitrary code execution. A malicious server or an attacker who intercepts the network traffic can send an invalid size for a packet which will trigger a buffer overflow.

CVSS vector

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9

Affected Packages4 packages

debiandebian/pidgin< pidgin 2.11.0-1 (bookworm)
Debianpidgin/pidgin< 2.11.0-1+3
NVDpidgin/pidgin2.10.12
CVEListV5pidgin/pidgin2.10.11

Also affects: Debian Linux 8.0, Ubuntu Linux 12.04, 14.04, 15.10

Patches

🔴Vulnerability Details

2
GHSA
GHSA-cm5h-pv24-5q45: A buffer overflow vulnerability exists in the handling of the MXIT protocol in Pidgin2022-05-17
OSV
CVE-2016-2376: A buffer overflow vulnerability exists in the handling of the MXIT protocol in Pidgin2017-01-06

📋Vendor Advisories

3
Ubuntu
Pidgin vulnerabilities2016-07-12
Red Hat
pidgin: MXIT read stage 0x3 Code Execution Vulnerability2016-06-21
Debian
CVE-2016-2376: pidgin - A buffer overflow vulnerability exists in the handling of the MXIT protocol in P...2016

🕵️Threat Intelligence

2
Talos
Vulnerability Spotlight: Pidgin Vulnerabilities2016-06-21
Talos
Vulnerability Spotlight: Pidgin Vulnerabilities2016-06-21

💬Community

1
Bugzilla
CVE-2016-2376 pidgin: MXIT read stage 0x3 Code Execution Vulnerability2016-06-22