High severity8.1NVD Advisory· Published Jan 6, 2017· Updated May 6, 2026
CVE-2016-2378
CVE-2016-2378
Description
A buffer overflow vulnerability exists in the handling of the MXIT protocol Pidgin. Specially crafted data sent via the server could potentially result in a buffer overflow, potentially resulting in memory corruption. A malicious server or an unfiltered malicious user can send negative length values to trigger this vulnerability.
Affected products
6cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*range: <=2.10.12
- (no CPE)range: 2.10.11
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*+ 2 more
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- www.pidgin.im/news/security/nvdPatchVendor Advisory
- www.debian.org/security/2016/dsa-3620nvdThird Party Advisory
- www.securityfocus.com/bid/91335nvdThird Party AdvisoryVDB Entry
- www.talosintelligence.com/reports/TALOS-2016-0120/nvdTechnical DescriptionThird Party Advisory
- www.ubuntu.com/usn/USN-3031-1nvdThird Party Advisory
- security.gentoo.org/glsa/201701-38nvd
News mentions
0No linked articles in our index yet.