Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg) parser in Pidgin prior to 2.10.8 allows remote malicious users to have an unspecified impact via a large Content-Length value, which triggers a buffer overflow.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
pidgin pidgin 2.10.2 |
||
pidgin pidgin 2.10.1 |
||
pidgin pidgin 2.0.0 |
||
pidgin pidgin 2.10.6 |
||
pidgin pidgin 2.10.5 |
||
pidgin pidgin 2.1.0 |
||
pidgin pidgin 2.0.2 |
||
pidgin pidgin |
||
pidgin pidgin 2.10.0 |
||
pidgin pidgin 2.1.1 |
||
pidgin pidgin 2.10.4 |
||
pidgin pidgin 2.10.3 |
||
pidgin pidgin 2.0.1 |