CVE-2016-2378Improper Restriction of Operations within the Bounds of a Memory Buffer in Pidgin

Severity
8.1HIGHNVD
EPSS
3.3%
top 12.74%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 6
Latest updateMay 17

Description

A buffer overflow vulnerability exists in the handling of the MXIT protocol Pidgin. Specially crafted data sent via the server could potentially result in a buffer overflow, potentially resulting in memory corruption. A malicious server or an unfiltered malicious user can send negative length values to trigger this vulnerability.

CVSS vector

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9

Affected Packages4 packages

debiandebian/pidgin< pidgin 2.11.0-1 (bookworm)
Debianpidgin/pidgin< 2.11.0-1+3
NVDpidgin/pidgin2.10.12
CVEListV5pidgin/pidgin2.10.11

Also affects: Debian Linux 8.0, Ubuntu Linux 12.04, 14.04, 15.10

Patches

🔴Vulnerability Details

2
GHSA
GHSA-crwf-mvg9-fxf3: A buffer overflow vulnerability exists in the handling of the MXIT protocol Pidgin2022-05-17
OSV
CVE-2016-2378: A buffer overflow vulnerability exists in the handling of the MXIT protocol Pidgin2017-01-06

📋Vendor Advisories

3
Ubuntu
Pidgin vulnerabilities2016-07-12
Red Hat
pidgin: MXIT get_utf8_string Code Execution Vulnerability2016-06-21
Debian
CVE-2016-2378: pidgin - A buffer overflow vulnerability exists in the handling of the MXIT protocol Pidg...2016

🕵️Threat Intelligence

2
Talos
Vulnerability Spotlight: Pidgin Vulnerabilities2016-06-21
Talos
Vulnerability Spotlight: Pidgin Vulnerabilities2016-06-21

💬Community

1
Bugzilla
CVE-2016-2378 pidgin: MXIT get_utf8_string Code Execution Vulnerability2016-06-22