MEDIUM · 6.4

CVE-2013-6483

The XMPP protocol plugin in libpurple in Pidgin before 2.10.8 does not properly determine whether the from address in an iq reply is consistent with the to address in an iq request, which allows remot...

Vulnerability Description

The XMPP protocol plugin in libpurple in Pidgin before 2.10.8 does not properly determine whether the from address in an iq reply is consistent with the to address in an iq request, which allows remote attackers to spoof iq traffic or cause a denial of service (NULL pointer dereference and application crash) via a crafted reply.

CVSS Score

6.4

MEDIUM

AV:N/AC:L/Au:N/C:N/I:P/A:P
Confidentiality
NONE
Integrity
PARTIAL
Availability
PARTIAL

Affected Products

VendorProductVersions
PidginPidgin<= 2.10.7

Related Weaknesses (CWE)

References

FAQ

What is CVE-2013-6483?

CVE-2013-6483 is a vulnerability with a CVSS score of 6.4 (MEDIUM). The XMPP protocol plugin in libpurple in Pidgin before 2.10.8 does not properly determine whether the from address in an iq reply is consistent with the to address in an iq request, which allows remot...

How severe is CVE-2013-6483?

CVE-2013-6483 has been rated MEDIUM with a CVSS base score of 6.4/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2013-6483?

Check the references section above for vendor advisories and patch information. Affected products include: Pidgin Pidgin.