Page 8 of 85 results (0.009 seconds)

CVSS: 5.0EPSS: 3%CPEs: 53EXPL: 0

Integer signedness error in the MXit functionality in Pidgin before 2.10.8 allows remote attackers to cause a denial of service (segmentation fault) via a crafted emoticon value, which triggers an integer overflow and a buffer overflow. Error de signo de enteros en la funcionalidad MXit en Pidgin anterior a 2.10.8 permite a atacantes remotos causar una denegación de servicio (fallo de segmentación) a través de un valor manipulado de emoticono, lo que provoca un desbordamiento de entero y desbordamiento de buffer. • http://hg.pidgin.im/pidgin/main/rev/4c897372b5a4 http://www.debian.org/security/2014/dsa-2859 http://www.pidgin.im/news/security/?id=83 http://www.securityfocus.com/bid/65192 http://www.ubuntu.com/usn/USN-2100-1 https://rhn.redhat.com/errata/RHSA-2014-0139.html https://access.redhat.com/security/cve/CVE-2013-6489 https://bugzilla.redhat.com/show_bug.cgi?id=1057490 • CWE-122: Heap-based Buffer Overflow CWE-189: Numeric Errors •

CVSS: 10.0EPSS: 1%CPEs: 53EXPL: 1

The SIMPLE protocol functionality in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a negative Content-Length header, which triggers a buffer overflow. La funcionalidad del protocolo SIMPLE en Pidgin anterior a 2.10.8 permite a atacantes remotos tener un impacto no especificado a través de una cabecera Content-Length negativo, lo que provoca un desbordamiento de buffer. • https://github.com/Everdoh/CVE-2013-6490 http://hg.pidgin.im/pidgin/main/rev/6bd2dd10e5da http://www.debian.org/security/2014/dsa-2859 http://www.pidgin.im/news/security/?id=84 http://www.securityfocus.com/bid/65195 http://www.ubuntu.com/usn/USN-2100-1 https://rhn.redhat.com/errata/RHSA-2014-0139.html https://access.redhat.com/security/cve/CVE-2013-6490 https://bugzilla.redhat.com/show_bug.cgi?id=1057498 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •

CVSS: 5.0EPSS: 1%CPEs: 53EXPL: 0

The IRC protocol plugin in libpurple in Pidgin before 2.10.8 does not validate argument counts, which allows remote IRC servers to cause a denial of service (application crash) via a crafted message. El plugin del protocolo IRC en libpurple en Pidgin anterior a 2.10.8 no valida la cantidad de argumentos, lo que permite a servidores IRC remotos causar una denegación de servicio (caída de la aplicación) a través de un mensaje manipulado. • http://hg.pidgin.im/pidgin/main/rev/4d9be297d399 http://hg.pidgin.im/pidgin/main/rev/5845d9fa7084 http://hg.pidgin.im/pidgin/main/rev/6b0e0566af20 http://hg.pidgin.im/pidgin/main/rev/7d0fb0c6d8d4 http://hg.pidgin.im/pidgin/main/rev/9f132a6855cd http://hg.pidgin.im/pidgin/main/rev/a167504359e5 http://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html http://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html http://pidgin.im/news/security/?id=85 http:&# • CWE-20: Improper Input Validation CWE-628: Function Call with Incorrectly Specified Arguments •

CVSS: 5.0EPSS: 2%CPEs: 53EXPL: 0

The Yahoo! protocol plugin in libpurple in Pidgin before 2.10.8 does not properly validate UTF-8 data, which allows remote attackers to cause a denial of service (application crash) via crafted byte sequences. El plugin del protocolo de Yahoo! en libpurple en Pidgin anterior a 2.10.8 no valida debidamente datos UTF-8, lo que permite a atacantes remotos causar una denegación de servicio (caída de la aplicación) a través de secuencias de bytes manipuladas. • http://hg.pidgin.im/pidgin/main/rev/b0345c25f886 http://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html http://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html http://pidgin.im/news/security/?id=70 http://www.ubuntu.com/usn/USN-2100-1 https://rhn.redhat.com/errata/RHSA-2014-0139.html https://access.redhat.com/security/cve/CVE-2012-6152 https://bugzilla.redhat.com/show_bug.cgi?id=1056473 • CWE-20: Improper Input Validation CWE-172: Encoding Error •

CVSS: 5.0EPSS: 0%CPEs: 51EXPL: 0

The MXit protocol plugin in libpurple in Pidgin before 2.10.7 might allow remote attackers to create or overwrite files via a crafted (1) mxit or (2) mxit/imagestrips pathname. El plugin de protocolo MXit en libpurple en Pidgin anterior a v2.10.7 puede permitir a atacantes remotos sobreescribir ficheros mediante una ruta (1) mxit o (2) mxit/imagestrips • http://hg.pidgin.im/pidgin/main/rev/a8aef1d340f2 http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html http://www.pidgin.im/news/security/?id=65 http://www.ubuntu.com/usn/USN-1746-1 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18386 •