CVE-2016-2367

MEDIUM

Pidgin < 2.10.12 - Information Disclosure

Title source: rule
STIX 2.1

Description

An information leak exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in an out-of-bounds read. A malicious user, server, or man-in-the-middle can send an invalid size for an avatar which will trigger an out-of-bounds read vulnerability. This could result in a denial of service or copy data from memory to the file, resulting in an information leak if the avatar is sent to another user.

References (6)

Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/91335
Patch, Vendor Advisory x_refsource_confirm
http://www.pidgin.im/news/security/?id=100
Third Party Advisory vendor-advisory x_refsource_debian
http://www.debian.org/security/2016/dsa-3620
Third Party Advisory vendor-advisory x_refsource_gentoo
https://security.gentoo.org/glsa/201701-38
Third Party Advisory vendor-advisory x_refsource_ubuntu
http://www.ubuntu.com/usn/USN-3031-1
Technical Description, Third Party Advisory x_refsource_misc
http://www.talosintelligence.com/reports/TALOS-2016-0135/

Scores

CVSS v3 5.9
EPSS 0.0191
EPSS Percentile 83.5%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-125 CWE-200
Status published
Products (6)
canonical/ubuntu_linux 12.04
canonical/ubuntu_linux 14.04
canonical/ubuntu_linux 15.10
debian/debian_linux 8.0
pidgin/pidgin < 2.10.12
Pidgin/Pidgin 2.10.11
Published Jan 06, 2017
Tracked Since Feb 18, 2026