Vulnerability Description
Buffer overflow in markup.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.5 allows remote attackers to execute arbitrary code via a crafted inline image in a message.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pidgin | Pidgin | <= 2.10.4 |
Related Weaknesses (CWE)
References
- http://hg.pidgin.im/pidgin/main/rev/ded93865ef42ExploitPatch
- http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00009.html
- http://rhn.redhat.com/errata/RHSA-2012-1102.html
- http://secunia.com/advisories/50005
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:105
- http://www.pidgin.im/news/security/index.php?id=64Vendor Advisory
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3
- http://hg.pidgin.im/pidgin/main/rev/ded93865ef42ExploitPatch
- http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00009.html
- http://rhn.redhat.com/errata/RHSA-2012-1102.html
- http://secunia.com/advisories/50005
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:105
- http://www.pidgin.im/news/security/index.php?id=64Vendor Advisory
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3
FAQ
What is CVE-2012-3374?
CVE-2012-3374 is a vulnerability with a CVSS score of 7.5 (HIGH). Buffer overflow in markup.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.5 allows remote attackers to execute arbitrary code via a crafted inline image in a message.
How severe is CVE-2012-3374?
CVE-2012-3374 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-3374?
Check the references section above for vendor advisories and patch information. Affected products include: Pidgin Pidgin.