CVE-2013-6483

critical

Description

The XMPP protocol plugin in libpurple in Pidgin before 2.10.8 does not properly determine whether the from address in an iq reply is consistent with the to address in an iq request, which allows remote attackers to spoof iq traffic or cause a denial of service (NULL pointer dereference and application crash) via a crafted reply.

References

https://rhn.redhat.com/errata/RHSA-2014-0139.html

http://www.ubuntu.com/usn/USN-2100-1

http://www.debian.org/security/2014/dsa-2859

http://pidgin.im/news/security/?id=78

http://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html

http://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html

http://hg.pidgin.im/pidgin/main/rev/93d4bff19574

Details

Source: Mitre, NVD

Published: 2014-02-06

Updated: 2014-03-16

Risk Information

CVSS v2

Base Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

Severity: Critical