MEDIUM · 5.9

CVE-2016-2372

An information leak exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in an out-of-bounds read. A malicious user, server, ...

Vulnerability Description

An information leak exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in an out-of-bounds read. A malicious user, server, or man-in-the-middle attacker can send an invalid size for a file transfer which will trigger an out-of-bounds read vulnerability. This could result in a denial of service or copy data from memory to the file, resulting in an information leak if the file is sent to another user.

CVSS Score

5.9

MEDIUM

CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
LOW
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
PidginPidgin<= 2.10.12
CanonicalUbuntu Linux12.04
DebianDebian Linux8.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2016-2372?

CVE-2016-2372 is a vulnerability with a CVSS score of 5.9 (MEDIUM). An information leak exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in an out-of-bounds read. A malicious user, server, ...

How severe is CVE-2016-2372?

CVE-2016-2372 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2016-2372?

Check the references section above for vendor advisories and patch information. Affected products include: Pidgin Pidgin, Canonical Ubuntu Linux, Debian Debian Linux.