CVE-2016-2368
moderate-risk
Published 2017-01-06
Multiple memory corruption vulnerabilities exist in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could result in multiple buffer overflows, potentially resulting in code execution or memory disclosure.
Do I need to act?
~
6.0% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.1/10
High
NETWORK
/ HIGH complexity
Affected Products (5)
References (12)
Third Party Advisory
http://www.debian.org/security/2016/dsa-3620
Third Party Advisory
http://www.securityfocus.com/bid/91335
Technical Description
http://www.talosintelligence.com/reports/TALOS-2016-0136/
Third Party Advisory
http://www.ubuntu.com/usn/USN-3031-1
Third Party Advisory
http://www.debian.org/security/2016/dsa-3620
Third Party Advisory
http://www.securityfocus.com/bid/91335
Technical Description
http://www.talosintelligence.com/reports/TALOS-2016-0136/
Third Party Advisory
http://www.ubuntu.com/usn/USN-3031-1
45
/ 100
moderate-risk
Severity
24/34 · High
Exploitability
9/34 · Low
Exposure
12/34 · Low