{"id":"UBUNTU-CVE-2016-2379","details":"The Mxit protocol uses weak encryption when encrypting user passwords, which might allow attackers to (1) decrypt hashed passwords by leveraging knowledge of client registration codes or (2) gain login access by eavesdropping on login messages and re-using the hashed passwords.","modified":"2025-10-24T04:45:38Z","published":"2017-03-29T20:59:00Z","upstream":["CVE-2016-2379"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2379"},{"type":"REPORT","url":"http://www.talosintelligence.com/reports/TALOS-2016-0122/"},{"type":"REPORT","url":"https://pidgin.im/news/security/?id=95"},{"type":"REPORT","url":"https://security.gentoo.org/glsa/201701-38"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2016-2379"}],"affected":[{"package":{"name":"pidgin","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/pidgin@1:2.10.9-0ubuntu3.4?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1:2.10.7-0ubuntu4.1","1:2.10.7-0ubuntu4.2","1:2.10.9-0ubuntu1","1:2.10.9-0ubuntu2","1:2.10.9-0ubuntu3","1:2.10.9-0ubuntu3.1","1:2.10.9-0ubuntu3.2","1:2.10.9-0ubuntu3.3","1:2.10.9-0ubuntu3.4"],"ecosystem_specific":{"binaries":[{"binary_version":"1:2.10.9-0ubuntu3.4","binary_name":"finch"},{"binary_version":"1:2.10.9-0ubuntu3.4","binary_name":"finch-dev"},{"binary_version":"1:2.10.9-0ubuntu3.4","binary_name":"libpurple-bin"},{"binary_version":"1:2.10.9-0ubuntu3.4","binary_name":"libpurple-dev"},{"binary_version":"1:2.10.9-0ubuntu3.4","binary_name":"libpurple0"},{"binary_version":"1:2.10.9-0ubuntu3.4","binary_name":"pidgin"},{"binary_version":"1:2.10.9-0ubuntu3.4","binary_name":"pidgin-data"},{"binary_version":"1:2.10.9-0ubuntu3.4","binary_name":"pidgin-dev"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-2379.json"}},{"package":{"name":"pidgin","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/pidgin@1:2.10.12-0ubuntu5.2?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1:2.10.11-0ubuntu4","1:2.10.11-0ubuntu5","1:2.10.12-0ubuntu1","1:2.10.12-0ubuntu2","1:2.10.12-0ubuntu3","1:2.10.12-0ubuntu4","1:2.10.12-0ubuntu5","1:2.10.12-0ubuntu5.1","1:2.10.12-0ubuntu5.2"],"ecosystem_specific":{"binaries":[{"binary_version":"1:2.10.12-0ubuntu5.2","binary_name":"finch"},{"binary_version":"1:2.10.12-0ubuntu5.2","binary_name":"finch-dev"},{"binary_version":"1:2.10.12-0ubuntu5.2","binary_name":"libpurple-bin"},{"binary_version":"1:2.10.12-0ubuntu5.2","binary_name":"libpurple-dev"},{"binary_version":"1:2.10.12-0ubuntu5.2","binary_name":"libpurple0"},{"binary_version":"1:2.10.12-0ubuntu5.2","binary_name":"pidgin"},{"binary_version":"1:2.10.12-0ubuntu5.2","binary_name":"pidgin-data"},{"binary_version":"1:2.10.12-0ubuntu5.2","binary_name":"pidgin-dev"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-2379.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]}