Bugzilla – Bug 991683
VUL-0: CVE-2016-2378: pidgin: MXIT get_utf8_string Code Execution Vulnerability
Last modified: 2018-06-11 14:39:06 UTC
rh#1348854 A buffer overflow vulnerability exists in the handling of the MXIT protocol Pidgin. Specially crafted data sent via the server could potentially result in a buffer overflow, potentially resulting in memory corruption. A malicious server or an unfiltered malicious user can send negative length values to trigger this vulnerability. External references: http://www.talosintel.com/reports/TALOS-2016-0120/ http://www.pidgin.im/news/security/?id=94 Upstream fix: https://bitbucket.org/pidgin/main/commits/06278419c703 https://bugzilla.redhat.com/show_bug.cgi?id=1348854
code is in sle11 and sle12
bugbot adjusting priority
With Mxit officially shut down its services in 2016 and pidgin dropped support to the protocol since 2.12. Efforts to backport the fix won't make much sense. Discussed with Johannes and decided to close this as WONTFIX.