First published: Fri Jan 06 2017(Updated: )
Multiple memory corruption vulnerabilities exist in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could result in multiple buffer overflows, potentially resulting in code execution or memory disclosure.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Pidgin | <=2.10.12 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.10 | |
Debian Linux | =8.0 | |
<=2.10.12 | ||
=12.04 | ||
=14.04 | ||
=15.10 | ||
=8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2368 has a critical severity rating due to the potential for remote code execution and memory disclosure.
To address CVE-2016-2368, upgrade Pidgin to version 2.10.12 or later.
CVE-2016-2368 affects all versions of Pidgin prior to 2.10.12.
CVE-2016-2368 impacts Pidgin on various operating systems including Ubuntu and Debian.
Yes, CVE-2016-2368 could potentially lead to memory disclosure which may contribute to data breaches.