CVE-2016-2377Improper Restriction of Operations within the Bounds of a Memory Buffer in Pidgin

Severity
8.1HIGHNVD
EPSS
3.3%
top 12.74%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 6
Latest updateMay 17

Description

A buffer overflow vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent by the server could potentially result in an out-of-bounds write of one byte. A malicious server can send a negative content-length in response to a HTTP request triggering the vulnerability.

CVSS vector

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9

Affected Packages4 packages

debiandebian/pidgin< pidgin 2.11.0-1 (bookworm)
Debianpidgin/pidgin< 2.11.0-1+3
NVDpidgin/pidgin2.10.12
CVEListV5pidgin/pidgin2.10.11

Also affects: Debian Linux 8.0, Ubuntu Linux 12.04, 14.04, 15.10

Patches

🔴Vulnerability Details

2
GHSA
GHSA-3fp2-p2cp-pcrx: A buffer overflow vulnerability exists in the handling of the MXIT protocol in Pidgin2022-05-17
OSV
CVE-2016-2377: A buffer overflow vulnerability exists in the handling of the MXIT protocol in Pidgin2017-01-06

📋Vendor Advisories

3
Ubuntu
Pidgin vulnerabilities2016-07-12
Red Hat
pidgin: MXIT HTTP Content-Length Buffer Overflow Vulnerability2016-06-21
Debian
CVE-2016-2377: pidgin - A buffer overflow vulnerability exists in the handling of the MXIT protocol in P...2016

🕵️Threat Intelligence

2
Talos
Vulnerability Spotlight: Pidgin Vulnerabilities2016-06-21
Talos
Vulnerability Spotlight: Pidgin Vulnerabilities2016-06-21

💬Community

1
Bugzilla
CVE-2016-2377 pidgin: MXIT HTTP Content-Length Buffer Overflow Vulnerability2016-06-22