Multiple memory corruption vulnerabilities exist in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could result in multiple buffer overflows, potentially resulting in code execution or memory disclosure.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.debian.org/security/2016/dsa-3620 | Third Party Advisory | 
| http://www.pidgin.im/news/security/?id=101 | Patch Vendor Advisory | 
| http://www.securityfocus.com/bid/91335 | Third Party Advisory VDB Entry | 
| http://www.talosintelligence.com/reports/TALOS-2016-0136/ | Technical Description Third Party Advisory | 
| http://www.ubuntu.com/usn/USN-3031-1 | Third Party Advisory | 
| https://security.gentoo.org/glsa/201701-38 | |
| http://www.debian.org/security/2016/dsa-3620 | Third Party Advisory | 
| http://www.pidgin.im/news/security/?id=101 | Patch Vendor Advisory | 
| http://www.securityfocus.com/bid/91335 | Third Party Advisory VDB Entry | 
| http://www.talosintelligence.com/reports/TALOS-2016-0136/ | Technical Description Third Party Advisory | 
| http://www.ubuntu.com/usn/USN-3031-1 | Third Party Advisory | 
| https://security.gentoo.org/glsa/201701-38 | 
Configurations
                    Configuration 1 (hide)
| 
 | 
Configuration 2 (hide)
| 
 | 
Configuration 3 (hide)
| 
 | 
History
                    21 Nov 2024, 02:48
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://www.debian.org/security/2016/dsa-3620 - Third Party Advisory | |
| References | () http://www.pidgin.im/news/security/?id=101 - Patch, Vendor Advisory | |
| References | () http://www.securityfocus.com/bid/91335 - Third Party Advisory, VDB Entry | |
| References | () http://www.talosintelligence.com/reports/TALOS-2016-0136/ - Technical Description, Third Party Advisory | |
| References | () http://www.ubuntu.com/usn/USN-3031-1 - Third Party Advisory | |
| References | () https://security.gentoo.org/glsa/201701-38 - | 
Information
                Published : 2017-01-06 21:59
Updated : 2025-04-20 01:37
NVD link : CVE-2016-2368
Mitre link : CVE-2016-2368
CVE.ORG link : CVE-2016-2368
JSON object : View
Products Affected
                canonical
- ubuntu_linux
debian
- debian_linux
pidgin
- pidgin
CWE
                
                    
                        
                        CWE-119
                        
            Improper Restriction of Operations within the Bounds of a Memory Buffer
