A buffer overflow vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent from the server could potentially result in arbitrary code execution. A malicious server or an attacker who intercepts the network traffic can send an invalid size for a packet which will trigger a buffer overflow.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "1:2.10.9-0ubuntu3.3", "binary_name": "finch" }, { "binary_version": "1:2.10.9-0ubuntu3.3", "binary_name": "finch-dev" }, { "binary_version": "1:2.10.9-0ubuntu3.3", "binary_name": "libpurple-bin" }, { "binary_version": "1:2.10.9-0ubuntu3.3", "binary_name": "libpurple-dev" }, { "binary_version": "1:2.10.9-0ubuntu3.3", "binary_name": "libpurple0" }, { "binary_version": "1:2.10.9-0ubuntu3.3", "binary_name": "pidgin" }, { "binary_version": "1:2.10.9-0ubuntu3.3", "binary_name": "pidgin-data" }, { "binary_version": "1:2.10.9-0ubuntu3.3", "binary_name": "pidgin-dev" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "1:2.10.12-0ubuntu5.1", "binary_name": "finch" }, { "binary_version": "1:2.10.12-0ubuntu5.1", "binary_name": "finch-dev" }, { "binary_version": "1:2.10.12-0ubuntu5.1", "binary_name": "libpurple-bin" }, { "binary_version": "1:2.10.12-0ubuntu5.1", "binary_name": "libpurple-dev" }, { "binary_version": "1:2.10.12-0ubuntu5.1", "binary_name": "libpurple0" }, { "binary_version": "1:2.10.12-0ubuntu5.1", "binary_name": "pidgin" }, { "binary_version": "1:2.10.12-0ubuntu5.1", "binary_name": "pidgin-data" }, { "binary_version": "1:2.10.12-0ubuntu5.1", "binary_name": "pidgin-dev" } ] }