CVE-2013-6487
06.02.2014, 17:00
Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg) parser in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a large Content-Length value, which triggers a buffer overflow.Enginsight
| Vendor | Product | Version |
|---|---|---|
| pidgin | pidgin | 𝑥 ≤ 2.10.7 |
| pidgin | pidgin | 2.0.0 |
| pidgin | pidgin | 2.0.1 |
| pidgin | pidgin | 2.0.2 |
| pidgin | pidgin | 2.0.2 |
| pidgin | pidgin | 2.1.0 |
| pidgin | pidgin | 2.1.1 |
| pidgin | pidgin | 2.10.0 |
| pidgin | pidgin | 2.10.1 |
| pidgin | pidgin | 2.10.2 |
| pidgin | pidgin | 2.10.3 |
| pidgin | pidgin | 2.10.4 |
| pidgin | pidgin | 2.10.5 |
| pidgin | pidgin | 2.10.6 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Ubuntu Product | |||||||||
|---|---|---|---|---|---|---|---|---|---|
| libgadu |
| ||||||||
| pidgin |
|
Common Weakness Enumeration
References