// For flags

CVE-2014-3696

pidgin: denial of service parsing Groupwise server message

Severity Score

4.3
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

nmevent.c in the Novell GroupWise protocol plugin in libpurple in Pidgin before 2.10.10 allows remote servers to cause a denial of service (application crash) via a crafted server message that triggers a large memory allocation.

nmevent.c en el plugin del protocolo Novell GroupWise en libpurple en Pidgin anterior a 2.10.10 permite a servidores remotos causar una denegación de servicio (caída de aplicación) a través de un mensaje del servidor manipulado que provoca una reserva grande de memoria.

A denial of service flaw was found in the way Pidgin parsed Groupwise server messages. A malicious remote server or a man-in-the-middle attacker could potentially use this flaw to cause Pidgin to consume an excessive amount of memory, possibly leading to a crash, by sending a specially crafted message.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
Low
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2014-05-14 CVE Reserved
  • 2014-10-24 CVE Published
  • 2024-06-10 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
  • CWE-770: Allocation of Resources Without Limits or Throttling
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Pidgin
Search vendor "Pidgin"
Pidgin
Search vendor "Pidgin" for product "Pidgin"
<= 2.10.9
Search vendor "Pidgin" for product "Pidgin" and version " <= 2.10.9"
-
Affected
Pidgin
Search vendor "Pidgin"
Pidgin
Search vendor "Pidgin" for product "Pidgin"
2.10.0
Search vendor "Pidgin" for product "Pidgin" and version "2.10.0"
-
Affected
Pidgin
Search vendor "Pidgin"
Pidgin
Search vendor "Pidgin" for product "Pidgin"
2.10.1
Search vendor "Pidgin" for product "Pidgin" and version "2.10.1"
-
Affected
Pidgin
Search vendor "Pidgin"
Pidgin
Search vendor "Pidgin" for product "Pidgin"
2.10.2
Search vendor "Pidgin" for product "Pidgin" and version "2.10.2"
-
Affected
Pidgin
Search vendor "Pidgin"
Pidgin
Search vendor "Pidgin" for product "Pidgin"
2.10.3
Search vendor "Pidgin" for product "Pidgin" and version "2.10.3"
-
Affected
Pidgin
Search vendor "Pidgin"
Pidgin
Search vendor "Pidgin" for product "Pidgin"
2.10.4
Search vendor "Pidgin" for product "Pidgin" and version "2.10.4"
-
Affected
Pidgin
Search vendor "Pidgin"
Pidgin
Search vendor "Pidgin" for product "Pidgin"
2.10.5
Search vendor "Pidgin" for product "Pidgin" and version "2.10.5"
-
Affected
Pidgin
Search vendor "Pidgin"
Pidgin
Search vendor "Pidgin" for product "Pidgin"
2.10.6
Search vendor "Pidgin" for product "Pidgin" and version "2.10.6"
-
Affected
Pidgin
Search vendor "Pidgin"
Pidgin
Search vendor "Pidgin" for product "Pidgin"
2.10.7
Search vendor "Pidgin" for product "Pidgin" and version "2.10.7"
-
Affected
Pidgin
Search vendor "Pidgin"
Pidgin
Search vendor "Pidgin" for product "Pidgin"
2.10.8
Search vendor "Pidgin" for product "Pidgin" and version "2.10.8"
-
Affected