Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg)
parser in Pidgin before 2.10.8 allows remote attackers to have an
unspecified impact via a large Content-Length value, which triggers a
buffer overflow.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 12.04 | noarch | libgadu | < 1:1.11.1-1ubuntu0.1 | UNKNOWN |
ubuntu | 12.10 | noarch | libgadu | < 1:1.11.2-1ubuntu0.12.10.1 | UNKNOWN |
ubuntu | 13.10 | noarch | libgadu | < 1:1.11.2-1ubuntu1.1 | UNKNOWN |
ubuntu | 12.04 | noarch | pidgin | < 1:2.10.3-0ubuntu1.4 | UNKNOWN |
ubuntu | 12.10 | noarch | pidgin | < 1:2.10.6-0ubuntu2.3 | UNKNOWN |
ubuntu | 13.10 | noarch | pidgin | < 1:2.10.7-0ubuntu4.1.13.10.1 | UNKNOWN |