An exploitable out-of-bounds read exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT contact information sent from the server can result in memory disclosure.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
http://www.talosintelligence.com/reports/TALOS-2016-0143/ | third party advisory technical description |
http://www.securityfocus.com/bid/91335 | vdb entry third party advisory |
http://www.debian.org/security/2016/dsa-3620 | third party advisory vendor advisory |
http://www.pidgin.im/news/security/?id=108 | patch vendor advisory |
https://security.gentoo.org/glsa/201701-38 | vendor advisory |
http://www.ubuntu.com/usn/USN-3031-1 | third party advisory vendor advisory |