CVE-2016-2374

HIGH

Pidgin < 2.10.12 - Information Disclosure

Title source: rule
STIX 2.1

Description

An exploitable memory corruption vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT MultiMX message sent via the server can result in an out-of-bounds write leading to memory disclosure and code execution.

References (6)

Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/91335
Third Party Advisory vendor-advisory x_refsource_debian
http://www.debian.org/security/2016/dsa-3620
Patch, Vendor Advisory x_refsource_confirm
http://www.pidgin.im/news/security/?id=107
Third Party Advisory vendor-advisory x_refsource_gentoo
https://security.gentoo.org/glsa/201701-38
Technical Description, Third Party Advisory x_refsource_misc
http://www.talosintelligence.com/reports/TALOS-2016-0142/
Third Party Advisory vendor-advisory x_refsource_ubuntu
http://www.ubuntu.com/usn/USN-3031-1

Scores

CVSS v3 8.1
EPSS 0.0273
EPSS Percentile 86.1%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-125 CWE-200
Status published
Products (6)
canonical/ubuntu_linux 12.04
canonical/ubuntu_linux 14.04
canonical/ubuntu_linux 15.10
debian/debian_linux 8.0
pidgin/pidgin < 2.10.12
Pidgin/Pidgin 2.10.11
Published Jan 06, 2017
Tracked Since Feb 18, 2026