{"id":"UBUNTU-CVE-2016-2374","details":"An exploitable memory corruption vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT MultiMX message sent via the server can result in an out-of-bounds write leading to memory disclosure and code execution.","modified":"2026-02-04T02:27:59.710418Z","published":"2016-06-23T00:00:00Z","related":["USN-3031-1"],"upstream":["CVE-2016-2374"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2374"},{"type":"REPORT","url":"http://www.talosintel.com/reports/TALOS-2016-0142/"},{"type":"REPORT","url":"http://www.pidgin.im/news/security/?id=107"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3031-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2016-2374"}],"affected":[{"package":{"name":"pidgin","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/pidgin@1:2.10.9-0ubuntu3.3?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.10.9-0ubuntu3.3"}]}],"versions":["1:2.10.7-0ubuntu4.1","1:2.10.7-0ubuntu4.2","1:2.10.9-0ubuntu1","1:2.10.9-0ubuntu2","1:2.10.9-0ubuntu3","1:2.10.9-0ubuntu3.1","1:2.10.9-0ubuntu3.2"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"finch","binary_version":"1:2.10.9-0ubuntu3.3"},{"binary_name":"finch-dev","binary_version":"1:2.10.9-0ubuntu3.3"},{"binary_name":"libpurple-bin","binary_version":"1:2.10.9-0ubuntu3.3"},{"binary_name":"libpurple-dev","binary_version":"1:2.10.9-0ubuntu3.3"},{"binary_name":"libpurple0","binary_version":"1:2.10.9-0ubuntu3.3"},{"binary_name":"pidgin","binary_version":"1:2.10.9-0ubuntu3.3"},{"binary_name":"pidgin-data","binary_version":"1:2.10.9-0ubuntu3.3"},{"binary_name":"pidgin-dev","binary_version":"1:2.10.9-0ubuntu3.3"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-2374.json"}},{"package":{"name":"pidgin","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/pidgin@1:2.10.12-0ubuntu5.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.10.12-0ubuntu5.1"}]}],"versions":["1:2.10.11-0ubuntu4","1:2.10.11-0ubuntu5","1:2.10.12-0ubuntu1","1:2.10.12-0ubuntu2","1:2.10.12-0ubuntu3","1:2.10.12-0ubuntu4","1:2.10.12-0ubuntu5"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"finch","binary_version":"1:2.10.12-0ubuntu5.1"},{"binary_name":"finch-dev","binary_version":"1:2.10.12-0ubuntu5.1"},{"binary_name":"libpurple-bin","binary_version":"1:2.10.12-0ubuntu5.1"},{"binary_name":"libpurple-dev","binary_version":"1:2.10.12-0ubuntu5.1"},{"binary_name":"libpurple0","binary_version":"1:2.10.12-0ubuntu5.1"},{"binary_name":"pidgin","binary_version":"1:2.10.12-0ubuntu5.1"},{"binary_name":"pidgin-data","binary_version":"1:2.10.12-0ubuntu5.1"},{"binary_name":"pidgin-dev","binary_version":"1:2.10.12-0ubuntu5.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-2374.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}