Kaspersky ID:
KLA10942
Дата обнаружения:
21/06/2016
Обновлено:
22/01/2024

Описание

Multiple serious vulnerabilities have been found in Pidgin. Malicious users can exploit these vulnerabilities to cause a denial of sevice, obtain sensitive information, execute arbitrary code.

Below is a complete list of vulnerabilities:

  1. Null pointer derefence vulnerabilities and out-of-bounds-read vulnerabilities in the handling of the MXIT protocol can be exploited remotely via a specially designed MXIT data sent by malicious server or man-in-the-middle to cause a denial of service;
  2. An out-of-bounds-read vulnerability in the handling of the MXIT protocol can be exploited remotely via a specially designed MXIT data sent by malicious server or man-in-the-middle possibly to cause a denial of service or obtain sensitive information;
  3. Memory corruption vulnerabilities in the handling of the MXIT protocol can be exploited remotely via a specially designed MXIT data sent by malicious server or man-in-the-middle possibly to execute arbitrary code or obtain sensitive information;
  4. An out-of-bounds write vulnerability in the handling of the MXIT protocol can be exploited remotely via a specially designed MXIT data sent by malicious server or man-in-the-middle possibly to execute arbitrary code;
  5. An out-of-bounds read vulnerability in the handling of the MXIT protocol can be exploited remotely via a specially designed MXIT data sent by malicious server or man-in-the-middle possibly to obtain sensitive information;
  6. A memory corruption vulnerability in the handling of the MXIT protocol can be exploited remotely via a specially designed MXIT MultiMX message sent by malicious server or man-in-the-middle to execute arbitrary code or obtain sensitive information;
  7. A buffer overflow vulnerability in the handling of the MXIT protocol can be exploited remotely via a specially designed MXIT data sent by malicious server or man-in-the-middle possibly to execute arbitrary code;
  8. A buffer overflow vulnerability in the handling of the MXIT protocol can be exploited remotely via a specially designed MXIT data sent by malicious server or man-in-the-middle possibly to cause a denial of service;
  9. An out-of-bounds read vulnerability in the handling of the MXIT protocol can be exploited remotely via a specially designed MXIT contact information sent by malicious server or man-in-the-middle possibly to obtain sensitive information.

Technical details

Vulnerabilities (1) can be triggered by sending invalid data, an invalid mood or a packet starting with a NULL byte.

Vulnerability (2) can be triggered by sending an invalid size for an avatar.

Vulnerability (5) can be triggered in case an invalid size of file transfer is sent.

Vulnerability (7) can be triggered in case an invalid size for a packet is sent.

Vulnerability (8) can be triggered in case a negative content-length in response to a HTTP request is sent. Such data causes an out-of-bounds write of one byte.

Первичный источник обнаружения

Связанные продукты

Список CVE

  • CVE-2016-2365
    warning
  • CVE-2016-2366
    warning
  • CVE-2016-2367
    warning
  • CVE-2016-2368
    critical
  • CVE-2016-2369
    warning
  • CVE-2016-2370
    warning
  • CVE-2016-2371
    high
  • CVE-2016-2372
    warning
  • CVE-2016-2373
    warning
  • CVE-2016-2374
    high
  • CVE-2016-2375
    warning
  • CVE-2016-2376
    high
  • CVE-2016-2377
    high

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Confirm changes?
Your message has been sent successfully.