CVE-2013-6487
06.02.2014, 17:00
Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg) parser in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a large Content-Length value, which triggers a buffer overflow.Enginsight
Vendor | Product | Version |
---|---|---|
pidgin | pidgin | 𝑥 ≤ 2.10.7 |
pidgin | pidgin | 2.0.0 |
pidgin | pidgin | 2.0.1 |
pidgin | pidgin | 2.0.2 |
pidgin | pidgin | 2.0.2 |
pidgin | pidgin | 2.1.0 |
pidgin | pidgin | 2.1.1 |
pidgin | pidgin | 2.10.0 |
pidgin | pidgin | 2.10.1 |
pidgin | pidgin | 2.10.2 |
pidgin | pidgin | 2.10.3 |
pidgin | pidgin | 2.10.4 |
pidgin | pidgin | 2.10.5 |
pidgin | pidgin | 2.10.6 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||
---|---|---|---|---|---|---|---|---|---|
libgadu |
| ||||||||
pidgin |
|
Common Weakness Enumeration
References