7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
7.2 High
AI Score
Confidence
Low
0.011 Low
EPSS
Percentile
84.2%
Debian Security Advisory DSA-3620-1 [email protected]
https://www.debian.org/security/ Salvatore Bonaccorso
July 15, 2016 https://www.debian.org/security/faq
Package : pidgin
CVE ID : CVE-2016-2365 CVE-2016-2366 CVE-2016-2367 CVE-2016-2368
CVE-2016-2369 CVE-2016-2370 CVE-2016-2371 CVE-2016-2372
CVE-2016-2373 CVE-2016-2374 CVE-2016-2375 CVE-2016-2376
CVE-2016-2377 CVE-2016-2378 CVE-2016-2380 CVE-2016-4323
Yves Younan of Cisco Talos discovered several vulnerabilities in the
MXit protocol support in pidgin, a multi-protocol instant messaging
client. A remote attacker can take advantage of these flaws to cause a
denial of service (application crash), overwrite files, information
disclosure, or potentially to execute arbitrary code.
For the stable distribution (jessie), these problems have been fixed in
version 2.11.0-0+deb8u1.
For the testing distribution (stretch), these problems have been fixed
in version 2.11.0-1.
For the unstable distribution (sid), these problems have been fixed in
version 2.11.0-1.
We recommend that you upgrade your pidgin packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 8 | armel | pidgin | < 2.11.0-0+deb8u1 | pidgin_2.11.0-0+deb8u1_armel.deb |
Debian | 8 | kfreebsd-i386 | pidgin-dbg | < 2.11.0-0+deb8u1 | pidgin-dbg_2.11.0-0+deb8u1_kfreebsd-i386.deb |
Debian | 7 | all | pidgin-dev | < 2.10.10-1~deb7u2 | pidgin-dev_2.10.10-1~deb7u2_all.deb |
Debian | 8 | s390x | pidgin | < 2.11.0-0+deb8u1 | pidgin_2.11.0-0+deb8u1_s390x.deb |
Debian | 8 | armel | pidgin-dbg | < 2.11.0-0+deb8u1 | pidgin-dbg_2.11.0-0+deb8u1_armel.deb |
Debian | 8 | all | pidgin | < 2.11.0-0+deb8u1 | pidgin_2.11.0-0+deb8u1_all.deb |
Debian | 8 | mipsel | pidgin | < 2.11.0-0+deb8u1 | pidgin_2.11.0-0+deb8u1_mipsel.deb |
Debian | 7 | armhf | pidgin-dbg | < 2.10.10-1~deb7u2 | pidgin-dbg_2.10.10-1~deb7u2_armhf.deb |
Debian | 7 | amd64 | pidgin-dbg | < 2.10.10-1~deb7u2 | pidgin-dbg_2.10.10-1~deb7u2_amd64.deb |
Debian | 8 | ppc64el | pidgin-dbg | < 2.11.0-0+deb8u1 | pidgin-dbg_2.11.0-0+deb8u1_ppc64el.deb |
7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
7.2 High
AI Score
Confidence
Low
0.011 Low
EPSS
Percentile
84.2%