CVE-2016-2379
Gentoo Linux Security Advisory 201701-38
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The Mxit protocol uses weak encryption when encrypting user passwords, which might allow attackers to (1) decrypt hashed passwords by leveraging knowledge of client registration codes or (2) gain login access by eavesdropping on login messages and re-using the hashed passwords.
El protocolo Mxit utiliza cifrado débil al cifrar contraseñas de usuario, lo que podría permitir a atacantes (1) Descifrar contraseñas hash aprovechando el conocimiento de los códigos de registro del cliente u (2) obtener acceso de acceso por escuchas en los mensajes de inicio de sesión y volver a utilizar las contraseñas hash.
Multiple vulnerabilities have been found in Pidgin, the worst of which could lead to execution of arbitrary code. Versions less than 2.11.0 are affected.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2016-02-12 CVE Reserved
- 2017-01-17 CVE Published
- 2024-08-05 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-326: Inadequate Encryption Strength
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/91335 | Third Party Advisory | |
http://www.talosintelligence.com/reports/TALOS-2016-0122 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://pidgin.im/news/security/?id=95 | 2017-04-10 | |
https://security.gentoo.org/glsa/201701-38 | 2017-04-10 |