Lucene search

K
rosalinuxROSA LABROSA-SA-2021-1951
HistoryJul 02, 2021 - 5:58 p.m.

Advisory ROSA-SA-2021-1951

2021-07-0217:58:49
ROSA LAB
abf.rosalinux.ru
7

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.9 High

AI Score

Confidence

Low

0.011 Low

EPSS

Percentile

84.2%

Software: pidgin 2.10.11
OS: Cobalt 7.9

CVE-ID: CVE-2016-1000030
CVE-Crit: CRITICAL
CVE-DESC: Pidgin version <2.11.0 contains a vulnerability in X.509 certificate import, specifically due to improper validation of return values from gnutls_x509_crt_init () and gnutls_x509_crt_import (), which could lead to code execution. This attack could be exploited by using a special X.509 certificate from another client. This vulnerability appears to have been fixed in 2.11.0.
CVE-STATUS: default
CVE-REV: default

CVE-ID: CVE-2016-2365
CVE-Crit: MEDIUM
CVE-DESC: A denial of service vulnerability exists in the processing of the MXIT protocol in Pidgin. Specially crafted MXIT data sent through the server could potentially lead to null pointer dereferencing. A malicious server or an attacker intercepting network traffic could send invalid data to trigger this vulnerability and cause a crash.
CVE-STATUS: Default
CVE-REV: Default

CVE-ID: CVE-2016-2366
CVE-Crit: MEDIUM
CVE-DESC: A denial of service vulnerability exists in the processing of the MXIT protocol in Pidgin. Specially crafted MXIT data sent through the server could potentially result in reads outside the valid range. A malicious server or an attacker intercepting network traffic could send invalid data to trigger this vulnerability and cause a crash.
CVE-STATUS: Default
CVE-REV: Default

CVE-ID: CVE-2016-2367
CVE-Crit: MEDIUM
CVE-DESC: There is an information leak when processing the MXIT protocol in Pidgin. Specially crafted MXIT data sent through the server could potentially result in reads outside of the allowed range. An attacker, server, or intermediary could send an invalid size for an avatar, causing an out-of-band read vulnerability. This could result in a denial of service or copying data from memory to a file, resulting in an information leak if the avatar is sent to another user.
CVE-STATUS: default
CVE-REV: default

CVE-ID: CVE-2016-2368
CVE-Crit: HIGH
CVE-DESC: Pidgin has several memory corruption vulnerabilities when processing the MXIT protocol. Specially crafted MXIT data sent through the server can cause multiple buffer overflows, which can lead to code execution or memory disclosure.
CVE-STATUS: default
CVE-REV: default

CVE-ID: CVE-2016-2369
CVE-Crit: MEDIUM
CVE-DESC: A null pointer dereferencing vulnerability exists in Pidgin when processing the MXIT protocol. Specially crafted MXIT data sent through a server could potentially lead to a denial of service vulnerability. A malicious server could send a packet starting with a null byte, causing the vulnerability.
CVE-STATUS: Default
CVE-REV: default

CVE-ID: CVE-2016-2370
CVE-Crit: MEDIUM
CVE-DESC: A denial of service vulnerability exists in the processing of the MXIT protocol in Pidgin. Specially crafted MXIT data sent from the server could potentially result in reads outside the valid range. A malicious server or attacker could send invalid data to cause this vulnerability.
CVE-STATUS: Default
CVE-REV: Default

CVE-ID: CVE-2016-2371
CVE-Crit: HIGH
CVE-DESC: There is an out-of-bounds write vulnerability when processing the MXIT protocol in Pidgin. Specially crafted MXIT data sent through the server can cause memory corruption, leading to code execution.
CVE-STATUS: default
CVE-REV: default

CVE-ID: CVE-2016-2372
CVE-Crit: MEDIUM
CVE-DESC: There is an information leak when processing the MXIT protocol in Pidgin. Specially crafted MXIT data sent through the server could potentially result in reads outside of the allowed range. An attacker, server, or malicious user could send an invalid size for a file transfer, causing a vulnerability of reading outside the valid range. This could cause a denial of service or copy data from memory to the file, resulting in an information leak if the file is sent to another user.
CVE-STATUS: Default
CVE-REV: Default

CVE-ID: CVE-2016-2373
CVE-Crit: MEDIUM
CVE-DESC: A denial of service vulnerability exists in the processing of the MXIT protocol in Pidgin. Specially crafted MXIT data sent through the server could potentially result in reads outside the valid range. A malicious server or user could send the wrong sentiment to cause this vulnerability.
CVE-STATUS: default
CVE-REV: default

CVE-ID: CVE-2016-2374
CVE-Crit: HIGH
CVE-DESC: A memory corruption vulnerability exists in the processing of the MXIT protocol in Pidgin. A specially crafted MXIT MultiMX message sent through the server could cause an out-of-bounds write, resulting in memory disclosure and code execution.
CVE-STATUS: default
CVE-REV: default

CVE-ID: CVE-2016-2375
CVE-Crit: MEDIUM
CVE-DESC: There is a vulnerable read location outside the valid range when processing the MXIT protocol in Pidgin. Specially crafted MXIT contact information sent from the server could lead to memory disclosure.
CVE-STATUS: default
CVE-REV: default

CVE-ID: CVE-2016-2376
CVE-Crit: HIGH
CVE-DESC: A buffer overflow vulnerability exists in Pidgin when processing the MXIT protocol. Specially crafted MXIT data sent from the server could potentially lead to the execution of arbitrary code. A malicious server or an attacker intercepting network traffic could send a packet of an invalid size, causing a buffer overflow.
CVE-STATUS: Default
CVE-REV: Default

CVE-ID: CVE-2016-2377
CVE-Crit: HIGH
CVE-DESC: A buffer overflow vulnerability exists in Pidgin when processing the MXIT protocol. Specially crafted MXIT data sent by the server could potentially cause a single byte to be written outside of the allowed range. A malicious server could send a negative content length in response to an HTTP request initiating the vulnerability.
CVE-STATUS: Default
CVE-REV: Default

CVE-ID: CVE-2016-2378
CVE-Crit: HIGH
CVE-DESC: A buffer overflow vulnerability exists in MXIT Pidgin protocol processing. Specially crafted data sent through the server could potentially cause a buffer overflow, which could result in memory corruption. A malicious server or unfiltered attacker could send negative length values to cause this vulnerability.
CVE-STATUS: default
CVE-REV: default

CVE-ID: CVE-2016-2380
CVE-Crit: LOW
CVE-DESC: There is an information leak during MXIT protocol processing in Pidgin. Specially crafted MXIT data sent to the server could potentially lead to reads outside the valid range. A user could be persuaded to enter a specific string, which would then be incorrectly converted and could potentially lead to a potential read outside the valid range.
CVE-STATUS: default
CVE-REV: default

CVE-ID: CVE-2016-4323
CVE-Crit: LOW
CVE-DESC: There is a directory traversal when Pidgin processes the MXIT protocol. Specially crafted MXIT data sent from the server could potentially cause files to be overwritten. A malicious server or someone with access to network traffic could provide an invalid file name for the splash screen that triggers the vulnerability.
CVE-STATUS: Default
CVE-REV: default

OSVersionArchitecturePackageVersionFilename
Cobaltanynoarchpidgin< 2.10.11UNKNOWN

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.9 High

AI Score

Confidence

Low

0.011 Low

EPSS

Percentile

84.2%