Vulnerability Description
Buffer overflow in http.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.7 allows remote servers to execute arbitrary code via a long HTTP header.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pidgin | Pidgin | <= 2.10.6 |
Related Weaknesses (CWE)
References
- http://hg.pidgin.im/pidgin/main/rev/879db2a9a59c
- http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00007.html
- http://www.pidgin.im/news/security/?id=66Vendor Advisory
- http://www.securityfocus.com/bid/57951
- http://www.ubuntu.com/usn/USN-1746-1
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3
- http://hg.pidgin.im/pidgin/main/rev/879db2a9a59c
- http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00007.html
- http://www.pidgin.im/news/security/?id=66Vendor Advisory
- http://www.securityfocus.com/bid/57951
- http://www.ubuntu.com/usn/USN-1746-1
FAQ
What is CVE-2013-0272?
CVE-2013-0272 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Buffer overflow in http.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.7 allows remote servers to execute arbitrary code via a long HTTP header.
How severe is CVE-2013-0272?
CVE-2013-0272 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-0272?
Check the references section above for vendor advisories and patch information. Affected products include: Pidgin Pidgin.