CVE-2016-2368

Source
https://nvd.nist.gov/vuln/detail/CVE-2016-2368
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-2368.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2016-2368
Related
Published
2017-01-06T21:59:00Z
Modified
2025-04-20T01:37:25Z
Downstream
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Multiple memory corruption vulnerabilities exist in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could result in multiple buffer overflows, potentially resulting in code execution or memory disclosure.

References

Affected packages

Debian:11 / pidgin

Package

Name
pidgin
Purl
pkg:deb/debian/pidgin?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.11.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / pidgin

Package

Name
pidgin
Purl
pkg:deb/debian/pidgin?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.11.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / pidgin

Package

Name
pidgin
Purl
pkg:deb/debian/pidgin?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.11.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}