CVE Vulnerabilities

CVE-2013-6487

Published: Feb 06, 2014 | Modified: Apr 11, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
4.3 MODERATE
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg) parser in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a large Content-Length value, which triggers a buffer overflow.

Affected Software

NameVendorStart VersionEnd Version
PidginPidgin*2.10.7 (including)
PidginPidgin2.0.0 (including)2.0.0 (including)
PidginPidgin2.0.1 (including)2.0.1 (including)
PidginPidgin2.0.2 (including)2.0.2 (including)
PidginPidgin2.1.0 (including)2.1.0 (including)
PidginPidgin2.1.1 (including)2.1.1 (including)
PidginPidgin2.10.0 (including)2.10.0 (including)
PidginPidgin2.10.1 (including)2.10.1 (including)
PidginPidgin2.10.2 (including)2.10.2 (including)
PidginPidgin2.10.3 (including)2.10.3 (including)
PidginPidgin2.10.4 (including)2.10.4 (including)
PidginPidgin2.10.5 (including)2.10.5 (including)
PidginPidgin2.10.6 (including)2.10.6 (including)
Red Hat Enterprise Linux 5RedHatpidgin-0:2.6.6-32.el5*
Red Hat Enterprise Linux 6RedHatpidgin-0:2.7.9-27.el6*
LibgaduUbuntulucid*
LibgaduUbuntuprecise*
LibgaduUbuntuquantal*
LibgaduUbuntusaucy*
LibgaduUbuntuupstream*
PidginUbuntudevel*
PidginUbuntulucid*
PidginUbuntuprecise*
PidginUbuntuquantal*
PidginUbuntusaucy*
PidginUbuntuupstream*

References