High severity8.1NVD Advisory· Published Jan 6, 2017· Updated May 6, 2026
CVE-2016-2371
CVE-2016-2371
Description
An out-of-bounds write vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could cause memory corruption resulting in code execution.
Affected products
62.10.11+ 1 more
- (no CPE)range: 2.10.11
- cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*range: <=2.10.12
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*+ 2 more
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- www.pidgin.im/news/security/nvdPatchVendor Advisory
- www.debian.org/security/2016/dsa-3620nvdThird Party Advisory
- www.securityfocus.com/bid/91335nvdThird Party AdvisoryVDB Entry
- www.talosintelligence.com/reports/TALOS-2016-0139/nvdTechnical DescriptionThird Party Advisory
- www.ubuntu.com/usn/USN-3031-1nvdThird Party Advisory
- security.gentoo.org/glsa/201701-38nvd
News mentions
0No linked articles in our index yet.