Bugzilla – Bug 991690
VUL-0: CVE-2016-2374: pidgin: MXIT MultiMX Message Code Execution Vulnerability
Last modified: 2018-06-11 14:39:21 UTC
rh#1348878 An exploitable memory corruption vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT MultiMX message sent via the server can result in an out-of-bounds write leading to memory disclosure and code execution. External references: http://www.talosintel.com/reports/TALOS-2016-0142/ http://www.pidgin.im/news/security/?id=107 Upstream fixes: https://bitbucket.org/pidgin/main/commits/f6c08d962618 https://bugzilla.redhat.com/show_bug.cgi?id=1348878
code is in sle11 and sle12.
bugbot adjusting priority
With Mxit officially shut down its services in 2016 and pidgin dropped support to the protocol since 2.12. Efforts to backport the fix won't make much sense. Discussed with Johannes and decided to close this as WONTFIX.