CVE-2016-2368
Publication date 23 June 2016
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
Multiple memory corruption vulnerabilities exist in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could result in multiple buffer overflows, potentially resulting in code execution or memory disclosure.
Status
Package | Ubuntu Release | Status |
---|---|---|
pidgin | 16.04 LTS xenial |
Fixed 1:2.10.12-0ubuntu5.1
|
14.04 LTS trusty |
Fixed 1:2.10.9-0ubuntu3.3
|
|
Patch details
Package | Patch details |
---|---|
pidgin |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.1 · High |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-3031-1
- Pidgin vulnerabilities
- 12 July 2016