Page 8 of 38 results (0.006 seconds)

CVSS: 10.0EPSS: 1%CPEs: 53EXPL: 1

The SIMPLE protocol functionality in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a negative Content-Length header, which triggers a buffer overflow. La funcionalidad del protocolo SIMPLE en Pidgin anterior a 2.10.8 permite a atacantes remotos tener un impacto no especificado a través de una cabecera Content-Length negativo, lo que provoca un desbordamiento de buffer. • https://github.com/Everdoh/CVE-2013-6490 http://hg.pidgin.im/pidgin/main/rev/6bd2dd10e5da http://www.debian.org/security/2014/dsa-2859 http://www.pidgin.im/news/security/?id=84 http://www.securityfocus.com/bid/65195 http://www.ubuntu.com/usn/USN-2100-1 https://rhn.redhat.com/errata/RHSA-2014-0139.html https://access.redhat.com/security/cve/CVE-2013-6490 https://bugzilla.redhat.com/show_bug.cgi?id=1057498 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •

CVSS: 5.0EPSS: 1%CPEs: 53EXPL: 0

The IRC protocol plugin in libpurple in Pidgin before 2.10.8 does not validate argument counts, which allows remote IRC servers to cause a denial of service (application crash) via a crafted message. El plugin del protocolo IRC en libpurple en Pidgin anterior a 2.10.8 no valida la cantidad de argumentos, lo que permite a servidores IRC remotos causar una denegación de servicio (caída de la aplicación) a través de un mensaje manipulado. • http://hg.pidgin.im/pidgin/main/rev/4d9be297d399 http://hg.pidgin.im/pidgin/main/rev/5845d9fa7084 http://hg.pidgin.im/pidgin/main/rev/6b0e0566af20 http://hg.pidgin.im/pidgin/main/rev/7d0fb0c6d8d4 http://hg.pidgin.im/pidgin/main/rev/9f132a6855cd http://hg.pidgin.im/pidgin/main/rev/a167504359e5 http://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html http://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html http://pidgin.im/news/security/?id=85 http:&# • CWE-20: Improper Input Validation CWE-628: Function Call with Incorrectly Specified Arguments •

CVSS: 5.0EPSS: 2%CPEs: 53EXPL: 0

The Yahoo! protocol plugin in libpurple in Pidgin before 2.10.8 does not properly validate UTF-8 data, which allows remote attackers to cause a denial of service (application crash) via crafted byte sequences. El plugin del protocolo de Yahoo! en libpurple en Pidgin anterior a 2.10.8 no valida debidamente datos UTF-8, lo que permite a atacantes remotos causar una denegación de servicio (caída de la aplicación) a través de secuencias de bytes manipuladas. • http://hg.pidgin.im/pidgin/main/rev/b0345c25f886 http://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html http://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html http://pidgin.im/news/security/?id=70 http://www.ubuntu.com/usn/USN-2100-1 https://rhn.redhat.com/errata/RHSA-2014-0139.html https://access.redhat.com/security/cve/CVE-2012-6152 https://bugzilla.redhat.com/show_bug.cgi?id=1056473 • CWE-20: Improper Input Validation CWE-172: Encoding Error •