CVE-2016-4323Path Traversal in Pidgin

CWE-22Path Traversal9 documents8 sources
Severity
3.7LOWNVD
EPSS
2.0%
top 16.32%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 6
Latest updateMay 17

Description

A directory traversal exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent from the server could potentially result in an overwrite of files. A malicious server or someone with access to the network traffic can provide an invalid filename for a splash image triggering the vulnerability.

CVSS vector

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:NExploitability: 2.2 | Impact: 1.4

Affected Packages4 packages

debiandebian/pidgin< pidgin 2.11.0-1 (bookworm)
Debianpidgin/pidgin< 2.11.0-1+3
NVDpidgin/pidgin2.10.12
CVEListV5pidgin/pidgin2.10.11

Also affects: Debian Linux 8.0, Ubuntu Linux 12.04, 14.04, 15.10

Patches

🔴Vulnerability Details

2
GHSA
GHSA-7w5x-jm9f-8g7x: A directory traversal exists in the handling of the MXIT protocol in Pidgin2022-05-17
OSV
CVE-2016-4323: A directory traversal exists in the handling of the MXIT protocol in Pidgin2017-01-06

📋Vendor Advisories

3
Ubuntu
Pidgin vulnerabilities2016-07-12
Red Hat
pidgin: MXIT Splash Image Arbitrary File Overwrite Vulnerability2016-06-21
Debian
CVE-2016-4323: pidgin - A directory traversal exists in the handling of the MXIT protocol in Pidgin. Spe...2016

🕵️Threat Intelligence

2
Talos
Vulnerability Spotlight: Pidgin Vulnerabilities2016-06-21
Talos
Vulnerability Spotlight: Pidgin Vulnerabilities2016-06-21

💬Community

1
Bugzilla
CVE-2016-4323 pidgin: MXIT Splash Image Arbitrary File Overwrite Vulnerability2016-06-22