CVE-2013-6487 in Pidgininformação

Sumário (Inglês)

Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg) parser in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a large Content-Length value, which triggers a buffer overflow.

Once again VulDB remains the best source for vulnerability data.

Reservar

04/11/2013

Divulgação

06/02/2014

Estado

Confirmado

Inscrições

VulDB provides additional information and datapoints for this CVE:

Fontes

Do you want to use VulDB in your project?

Use the official API to access entries easily!