CVE-2013-6487

Publication date 3 February 2014

Last updated 24 July 2024


Ubuntu priority

Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg) parser in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a large Content-Length value, which triggers a buffer overflow.

Status

Package Ubuntu Release Status
libgadu 13.10 saucy
Fixed 1:1.11.2-1ubuntu1.1
12.10 quantal
Fixed 1:1.11.2-1ubuntu0.12.10.1
12.04 LTS precise
Fixed 1:1.11.1-1ubuntu0.1
10.04 LTS lucid Ignored end of life
pidgin 13.10 saucy
Fixed 1:2.10.7-0ubuntu4.1.13.10.1
12.10 quantal
Fixed 1:2.10.6-0ubuntu2.3
12.04 LTS precise
Fixed 1:2.10.3-0ubuntu1.4
10.04 LTS lucid Ignored end of life

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
pidgin

References

Related Ubuntu Security Notices (USN)

    • USN-2100-1
    • Pidgin vulnerabilities
    • 6 February 2014
    • USN-2101-1
    • libgadu vulnerability
    • 10 February 2014

Other references