First published: Thu Feb 06 2014(Updated: )
Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg) parser in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a large Content-Length value, which triggers a buffer overflow.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pidgin Pidgin | <=2.10.7 | |
Pidgin Pidgin | =2.0.0 | |
Pidgin Pidgin | =2.0.1 | |
Pidgin Pidgin | =2.0.2 | |
Pidgin Pidgin | =2.0.2 | |
Pidgin Pidgin | =2.1.0 | |
Pidgin Pidgin | =2.1.1 | |
Pidgin Pidgin | =2.10.0 | |
Pidgin Pidgin | =2.10.1 | |
Pidgin Pidgin | =2.10.2 | |
Pidgin Pidgin | =2.10.3 | |
Pidgin Pidgin | =2.10.4 | |
Pidgin Pidgin | =2.10.5 | |
Pidgin Pidgin | =2.10.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.