Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg) parser in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a large Content-Length value, which triggers a buffer overflow.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Pidgin | Pidgin | * | 2.10.7 (including) |
Pidgin | Pidgin | 2.0.0 (including) | 2.0.0 (including) |
Pidgin | Pidgin | 2.0.1 (including) | 2.0.1 (including) |
Pidgin | Pidgin | 2.0.2 (including) | 2.0.2 (including) |
Pidgin | Pidgin | 2.1.0 (including) | 2.1.0 (including) |
Pidgin | Pidgin | 2.1.1 (including) | 2.1.1 (including) |
Pidgin | Pidgin | 2.10.0 (including) | 2.10.0 (including) |
Pidgin | Pidgin | 2.10.1 (including) | 2.10.1 (including) |
Pidgin | Pidgin | 2.10.2 (including) | 2.10.2 (including) |
Pidgin | Pidgin | 2.10.3 (including) | 2.10.3 (including) |
Pidgin | Pidgin | 2.10.4 (including) | 2.10.4 (including) |
Pidgin | Pidgin | 2.10.5 (including) | 2.10.5 (including) |
Pidgin | Pidgin | 2.10.6 (including) | 2.10.6 (including) |