Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg) parser in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a large Content-Length value, which triggers a buffer overflow.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Pidgin | Pidgin | * | 2.10.7 (including) |
Pidgin | Pidgin | 2.0.0 (including) | 2.0.0 (including) |
Pidgin | Pidgin | 2.0.1 (including) | 2.0.1 (including) |
Pidgin | Pidgin | 2.0.2 (including) | 2.0.2 (including) |
Pidgin | Pidgin | 2.1.0 (including) | 2.1.0 (including) |
Pidgin | Pidgin | 2.1.1 (including) | 2.1.1 (including) |
Pidgin | Pidgin | 2.10.0 (including) | 2.10.0 (including) |
Pidgin | Pidgin | 2.10.1 (including) | 2.10.1 (including) |
Pidgin | Pidgin | 2.10.2 (including) | 2.10.2 (including) |
Pidgin | Pidgin | 2.10.3 (including) | 2.10.3 (including) |
Pidgin | Pidgin | 2.10.4 (including) | 2.10.4 (including) |
Pidgin | Pidgin | 2.10.5 (including) | 2.10.5 (including) |
Pidgin | Pidgin | 2.10.6 (including) | 2.10.6 (including) |
Red Hat Enterprise Linux 5 | RedHat | pidgin-0:2.6.6-32.el5 | * |
Red Hat Enterprise Linux 6 | RedHat | pidgin-0:2.7.9-27.el6 | * |
Libgadu | Ubuntu | lucid | * |
Libgadu | Ubuntu | precise | * |
Libgadu | Ubuntu | quantal | * |
Libgadu | Ubuntu | saucy | * |
Libgadu | Ubuntu | upstream | * |
Pidgin | Ubuntu | devel | * |
Pidgin | Ubuntu | lucid | * |
Pidgin | Ubuntu | precise | * |
Pidgin | Ubuntu | quantal | * |
Pidgin | Ubuntu | saucy | * |
Pidgin | Ubuntu | upstream | * |