USN-3031-1

Source
https://ubuntu.com/security/notices/USN-3031-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3031-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/USN-3031-1
Upstream
Related
Published
2016-07-12T16:48:09.258694Z
Modified
2025-10-13T04:34:17Z
Summary
pidgin vulnerabilities
Details

Yves Younan discovered that Pidgin contained multiple issues in the MXit protocol support. A remote attacker could use this issue to cause Pidgin to crash, resulting in a denial of service, or possibly execute arbitrary code.

References

Affected packages

Ubuntu:14.04:LTS / pidgin

Package

Name
pidgin
Purl
pkg:deb/ubuntu/pidgin@1:2.10.9-0ubuntu3.3?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:2.10.9-0ubuntu3.3

Affected versions

1:2.*

1:2.10.7-0ubuntu4.1
1:2.10.7-0ubuntu4.2
1:2.10.9-0ubuntu1
1:2.10.9-0ubuntu2
1:2.10.9-0ubuntu3
1:2.10.9-0ubuntu3.1
1:2.10.9-0ubuntu3.2

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "1:2.10.9-0ubuntu3.3",
            "binary_name": "finch"
        },
        {
            "binary_version": "1:2.10.9-0ubuntu3.3",
            "binary_name": "finch-dev"
        },
        {
            "binary_version": "1:2.10.9-0ubuntu3.3",
            "binary_name": "libpurple-bin"
        },
        {
            "binary_version": "1:2.10.9-0ubuntu3.3",
            "binary_name": "libpurple-dev"
        },
        {
            "binary_version": "1:2.10.9-0ubuntu3.3",
            "binary_name": "libpurple0"
        },
        {
            "binary_version": "1:2.10.9-0ubuntu3.3",
            "binary_name": "pidgin"
        },
        {
            "binary_version": "1:2.10.9-0ubuntu3.3",
            "binary_name": "pidgin-data"
        },
        {
            "binary_version": "1:2.10.9-0ubuntu3.3",
            "binary_name": "pidgin-dev"
        }
    ]
}

Database specific

cves_map

{
    "ecosystem": "Ubuntu:14.04:LTS",
    "cves": [
        {
            "severity": [
                {
                    "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2016-2365"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2016-2366"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2016-2367"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2016-2368"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2016-2369"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2016-2370"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2016-2371"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2016-2372"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2016-2373"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2016-2374"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2016-2375"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2016-2376"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2016-2377"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2016-2378"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2016-2380"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2016-4323"
        }
    ]
}