CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
84.2%
Package : pidgin
Version : 2.10.10-1~deb7u2
CVE ID : CVE-2016-2365 CVE-2016-2366 CVE-2016-2367 CVE-2016-2368
CVE-2016-2369 CVE-2016-2370 CVE-2016-2371 CVE-2016-2372
CVE-2016-2373 CVE-2016-2374 CVE-2016-2375 CVE-2016-2376
CVE-2016-2377 CVE-2016-2378 CVE-2016-2380 CVE-2016-4323
Numerous security issues have been identified and fixed in Pidgin in
Debian/Wheezy.
CVE-2016-2365
MXIT Markup Command Denial of Service Vulnerability
CVE-2016-2366
MXIT Table Command Denial of Service Vulnerability
CVE-2016-2367
MXIT Avatar Length Memory Disclosure Vulnerability
CVE-2016-2368
MXIT g_snprintf Multiple Buffer Overflow Vulnerabilities
CVE-2016-2369
MXIT CP_SOCK_REC_TERM Denial of Service Vulnerability
CVE-2016-2370
MXIT Custom Resource Denial of Service Vulnerability
CVE-2016-2371
MXIT Extended Profiles Code Execution Vulnerability
CVE-2016-2372
MXIT File Transfer Length Memory Disclosure Vulnerability
CVE-2016-2373
MXIT Contact Mood Denial of Service Vulnerability
CVE-2016-2374
MXIT MultiMX Message Code Execution Vulnerability
CVE-2016-2375
MXIT Suggested Contacts Memory Disclosure Vulnerability
CVE-2016-2376
MXIT read stage 0x3 Code Execution Vulnerability
CVE-2016-2377
MXIT HTTP Content-Length Buffer Overflow Vulnerability
CVE-2016-2378
MXIT get_utf8_string Code Execution Vulnerability
CVE-2016-2380
MXIT mxit_convert_markup_tx Information Leak Vulnerability
CVE-2016-4323
MXIT Splash Image Arbitrary File Overwrite Vulnerability
For Debian 7 "Wheezy", these problems have been fixed in version
2.10.10-1~deb7u2.
We recommend that you upgrade your pidgin packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
Brian May <[email protected]>
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 8 | mipsel | finch | < 2.11.0-0+deb8u1 | finch_2.11.0-0+deb8u1_mipsel.deb |
Debian | 8 | amd64 | pidgin-dbg | < 2.11.0-0+deb8u1 | pidgin-dbg_2.11.0-0+deb8u1_amd64.deb |
Debian | 8 | armel | pidgin | < 2.11.0-0+deb8u1 | pidgin_2.11.0-0+deb8u1_armel.deb |
Debian | 7 | armel | pidgin | < 2.10.10-1~deb7u2 | pidgin_2.10.10-1~deb7u2_armel.deb |
Debian | 8 | powerpc | pidgin | < 2.11.0-0+deb8u1 | pidgin_2.11.0-0+deb8u1_powerpc.deb |
Debian | 7 | all | pidgin-dev | < 2.10.10-1~deb7u2 | pidgin-dev_2.10.10-1~deb7u2_all.deb |
Debian | 8 | kfreebsd-i386 | finch | < 2.11.0-0+deb8u1 | finch_2.11.0-0+deb8u1_kfreebsd-i386.deb |
Debian | 8 | armel | finch | < 2.11.0-0+deb8u1 | finch_2.11.0-0+deb8u1_armel.deb |
Debian | 8 | armhf | finch | < 2.11.0-0+deb8u1 | finch_2.11.0-0+deb8u1_armhf.deb |
Debian | 8 | i386 | pidgin-dbg | < 2.11.0-0+deb8u1 | pidgin-dbg_2.11.0-0+deb8u1_i386.deb |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
84.2%