CVE-2013-6487

Priority
Medium
Description
Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg)
parser in Pidgin before 2.10.8 allows remote attackers to have an
unspecified impact via a large Content-Length value, which triggers a
buffer overflow.
References
Assigned-to
mdeslaur
Package
Upstream:released (2.10.8-1)
Ubuntu 10.04 LTS (Lucid Lynx):ignored (reached end-of-life)
Ubuntu 12.04 LTS (Precise Pangolin):released (1:2.10.3-0ubuntu1.4)
Ubuntu 12.10 (Quantal Quetzal):released (1:2.10.6-0ubuntu2.3)
Ubuntu 13.10 (Saucy Salamander):released (1:2.10.7-0ubuntu4.1.13.10.1)
Ubuntu 14.04 LTS (Trusty Tahr):released (1:2.10.9-0ubuntu1)
Patches:
Upstream:http://hg.pidgin.im/pidgin/main/rev/ec15aa187aa0
Package
Upstream:released (1:1.11.3-1)
Ubuntu 10.04 LTS (Lucid Lynx):ignored (reached end-of-life)
Ubuntu 12.04 LTS (Precise Pangolin):released (1:1.11.1-1ubuntu0.1)
Ubuntu 12.10 (Quantal Quetzal):released (1:1.11.2-1ubuntu0.12.10.1)
Ubuntu 13.10 (Saucy Salamander):released (1:1.11.2-1ubuntu1.1)
Ubuntu 14.04 LTS (Trusty Tahr):not-affected (1:1.11.3-1)
More Information

Valid XHTML 1.0 Strict

Updated: 2014-02-14 14:14:54 UTC (commit 7751)