An out-of-bounds write vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could cause memory corruption resulting in code execution.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/91335 | vdb entry third party advisory |
http://www.pidgin.im/news/security/?id=104 | patch vendor advisory |
http://www.talosintelligence.com/reports/TALOS-2016-0139/ | third party advisory technical description |
http://www.debian.org/security/2016/dsa-3620 | third party advisory vendor advisory |
https://security.gentoo.org/glsa/201701-38 | vendor advisory |
http://www.ubuntu.com/usn/USN-3031-1 | third party advisory vendor advisory |