First published: Thu Feb 06 2014(Updated: )
Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg) parser in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a large Content-Length value, which triggers a buffer overflow.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pidgin | <=2.10.7 | |
Pidgin | =2.0.0 | |
Pidgin | =2.0.1 | |
Pidgin | =2.0.2 | |
Pidgin | =2.0.2 | |
Pidgin | =2.1.0 | |
Pidgin | =2.1.1 | |
Pidgin | =2.10.0 | |
Pidgin | =2.10.1 | |
Pidgin | =2.10.2 | |
Pidgin | =2.10.3 | |
Pidgin | =2.10.4 | |
Pidgin | =2.10.5 | |
Pidgin | =2.10.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6487 has a medium severity rating due to the potential for remote code execution through a buffer overflow.
CVE-2013-6487 affects Pidgin versions before 2.10.8.
To fix CVE-2013-6487, upgrade Pidgin to version 2.10.8 or later.
CVE-2013-6487 is an integer overflow vulnerability that can lead to a buffer overflow.
There are no documented workarounds for CVE-2013-6487 other than upgrading to a patched version.