Bug 991686 (CVE-2016-2376) - VUL-0: CVE-2016-2376: pidgin: MXIT read stage 0x3 Code Execution Vulnerability
Summary: VUL-0: CVE-2016-2376: pidgin: MXIT read stage 0x3 Code Execution Vulnerability
Status: RESOLVED WONTFIX
Alias: CVE-2016-2376
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Major
Target Milestone: ---
Assignee: Felix Zhang
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/170402/
Whiteboard: CVSSv2:RedHat:CVE-2016-2376:5.1:(AV:N...
Keywords:
Depends on:
Blocks:
 
Reported: 2016-08-02 11:55 UTC by Marcus Meissner
Modified: 2018-06-11 14:39 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Marcus Meissner 2016-08-02 11:55:03 UTC
rh#1348848

A buffer overflows vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent from the server could potentially result in arbitrary code execution. A malicious server or an attacker who intercepts the network traffic can send an invalid size for a packet which will trigger a buffer overflow.

External references:

http://www.talosintel.com/reports/TALOS-2016-0118/
http://www.pidgin.im/news/security/?id=92

Upstream fix:

https://bitbucket.org/pidgin/main/commits/19f89eda8587

https://bugzilla.redhat.com/show_bug.cgi?id=1348848
Comment 1 Marcus Meissner 2016-08-02 11:57:05 UTC
in sle11 and sle12.
Comment 2 Swamp Workflow Management 2016-08-02 22:01:09 UTC
bugbot adjusting priority
Comment 4 Felix Zhang 2018-06-11 13:43:45 UTC
With Mxit officially shut down its services in 2016 and pidgin dropped support to the protocol since 2.12. Efforts to backport the fix won't make much sense.
Discussed with Johannes and decided to close this as WONTFIX.