High severity8.1NVD Advisory· Published Jan 6, 2017· Updated May 6, 2026
CVE-2016-2368
CVE-2016-2368
Description
Multiple memory corruption vulnerabilities exist in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could result in multiple buffer overflows, potentially resulting in code execution or memory disclosure.
Affected products
6cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*range: <=2.10.12
- (no CPE)range: 2.10.11
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*+ 2 more
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- www.pidgin.im/news/security/nvdPatchVendor Advisory
- www.debian.org/security/2016/dsa-3620nvdThird Party Advisory
- www.securityfocus.com/bid/91335nvdThird Party AdvisoryVDB Entry
- www.talosintelligence.com/reports/TALOS-2016-0136/nvdTechnical DescriptionThird Party Advisory
- www.ubuntu.com/usn/USN-3031-1nvdThird Party Advisory
- security.gentoo.org/glsa/201701-38nvd
News mentions
0No linked articles in our index yet.