Bugzilla – Bug 991705
VUL-0: CVE-2016-2365: pidgin: MXIT Markup Command Denial of Service Vulnerability
Last modified: 2020-11-10 21:20:00 UTC
rh#1348858 A denial of service vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in a null pointer dereference. A malicious server or an attacker who intercepts the network traffic can send invalid data to trigger this vulnerability and cause a crash. External references: http://www.talosintel.com/reports/TALOS-2016-0133/ http://www.pidgin.im/news/security/?id=98 Upstream fix: https://bitbucket.org/pidgin/main/commits/5fa3f2bc69d7 References: https://bugzilla.redhat.com/show_bug.cgi?id=1348858
both in sle11 and sle12
(actually the patch is not for this problem ... sigh )
bugbot adjusting priority
I looked around a bit, and the actual fix seems to be here: https://bitbucket.org/pidgin/main/commits/2ba646d2f87902df4736c7f0ad8bfa3d89426d79
With Mxit officially shut down its services in 2016 and pidgin dropped support to the protocol since 2.12. Efforts to backport the fix won't make much sense. Discussed with Johannes and decided to close this as WONTFIX.