CVE-2013-6483 (GCVE-0-2013-6483)

Vulnerability from cvelistv5 – Published: 2014-02-06 15:00 – Updated: 2024-08-06 17:39
VLAI?
Summary
The XMPP protocol plugin in libpurple in Pidgin before 2.10.8 does not properly determine whether the from address in an iq reply is consistent with the to address in an iq request, which allows remote attackers to spoof iq traffic or cause a denial of service (NULL pointer dereference and application crash) via a crafted reply.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://lists.opensuse.org/opensuse-updates/2014-0… vendor-advisoryx_refsource_SUSE
https://rhn.redhat.com/errata/RHSA-2014-0139.html vendor-advisoryx_refsource_REDHAT
http://www.debian.org/security/2014/dsa-2859 vendor-advisoryx_refsource_DEBIAN
http://lists.opensuse.org/opensuse-updates/2014-0… vendor-advisoryx_refsource_SUSE
http://www.ubuntu.com/usn/USN-2100-1 vendor-advisoryx_refsource_UBUNTU
http://hg.pidgin.im/pidgin/main/rev/93d4bff19574 x_refsource_CONFIRM
http://pidgin.im/news/security/?id=78 x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T17:39:01.871Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "openSUSE-SU-2014:0326",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html"
          },
          {
            "name": "RHSA-2014:0139",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://rhn.redhat.com/errata/RHSA-2014-0139.html"
          },
          {
            "name": "DSA-2859",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2014/dsa-2859"
          },
          {
            "name": "openSUSE-SU-2014:0239",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html"
          },
          {
            "name": "USN-2100-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2100-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://hg.pidgin.im/pidgin/main/rev/93d4bff19574"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://pidgin.im/news/security/?id=78"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-01-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The XMPP protocol plugin in libpurple in Pidgin before 2.10.8 does not properly determine whether the from address in an iq reply is consistent with the to address in an iq request, which allows remote attackers to spoof iq traffic or cause a denial of service (NULL pointer dereference and application crash) via a crafted reply."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-03-07T13:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "openSUSE-SU-2014:0326",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html"
        },
        {
          "name": "RHSA-2014:0139",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://rhn.redhat.com/errata/RHSA-2014-0139.html"
        },
        {
          "name": "DSA-2859",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2014/dsa-2859"
        },
        {
          "name": "openSUSE-SU-2014:0239",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html"
        },
        {
          "name": "USN-2100-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2100-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://hg.pidgin.im/pidgin/main/rev/93d4bff19574"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://pidgin.im/news/security/?id=78"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-6483",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The XMPP protocol plugin in libpurple in Pidgin before 2.10.8 does not properly determine whether the from address in an iq reply is consistent with the to address in an iq request, which allows remote attackers to spoof iq traffic or cause a denial of service (NULL pointer dereference and application crash) via a crafted reply."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "openSUSE-SU-2014:0326",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html"
            },
            {
              "name": "RHSA-2014:0139",
              "refsource": "REDHAT",
              "url": "https://rhn.redhat.com/errata/RHSA-2014-0139.html"
            },
            {
              "name": "DSA-2859",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2014/dsa-2859"
            },
            {
              "name": "openSUSE-SU-2014:0239",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html"
            },
            {
              "name": "USN-2100-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2100-1"
            },
            {
              "name": "http://hg.pidgin.im/pidgin/main/rev/93d4bff19574",
              "refsource": "CONFIRM",
              "url": "http://hg.pidgin.im/pidgin/main/rev/93d4bff19574"
            },
            {
              "name": "http://pidgin.im/news/security/?id=78",
              "refsource": "CONFIRM",
              "url": "http://pidgin.im/news/security/?id=78"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-6483",
    "datePublished": "2014-02-06T15:00:00",
    "dateReserved": "2013-11-04T00:00:00",
    "dateUpdated": "2024-08-06T17:39:01.871Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.10.7\", \"matchCriteriaId\": \"1566CF06-79F8-4293-87C4-419C35A85BF0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DBC2EBF3-73A7-4542-8E9C-47A4241A224C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AF62072D-4956-4FE6-931E-E6EE9C49F3E7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6499D8D5-0801-498C-BD4D-508506918CEF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"73CC76CD-FF35-4B3A-9F1E-4E5A65963057\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F694A1FC-2F10-48F9-8E8D-C88A8E7397AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5D22A117-78BE-4BAC-8A2A-6C00C9E3A4C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"59E216BC-29E4-4C31-9CF0-DE22C2E84968\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1BD203F7-B983-4FDD-9837-D68D4F388A4F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CB90B7CB-1A11-45A8-B0BC-9B2143D84A2F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C8E3CBA-2B33-49EF-9105-8DDBB938F519\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"72AA3282-CA7D-438C-A07C-A63392333630\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BEEFF420-2868-422B-BD22-9A5749C2398F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B139D83D-7D18-42C7-988C-2070B66CB943\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"047D9636-BCCE-4956-B5A3-D276F1C2EF2D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A8A794E-E1CB-4F0F-9739-D625E94EA566\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E64EEEA0-89CE-46BD-B387-A96521E76A6B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6E96AA3-B567-4E97-979A-D97A4F786D55\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"09C407C0-99A2-477B-87CF-6BE9F7B367E7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EBEF0457-39D8-465B-86A7-8DFA44A1F820\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E593BFF0-650E-4EDB-BF65-C509C8A807C9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E39468D5-1378-4441-B927-5C34C85B18AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C80012AD-8F49-4287-8AEC-C21AC5774CA9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7CB3CF0C-BECE-4685-A370-96424B0A5703\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D5BC0FC-2F7D-41BE-83E4-AEDACD71F427\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8321D92-B935-4C2A-81B1-5984BFF4FD57\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"43679F1D-E48D-483B-A67B-9DB8C641F649\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"00032CBA-479E-4880-ACAE-3B0F066C8146\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.6.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8DB3EA73-7CF5-4010-9346-25C728E5225E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B11BCF7-3127-4B2E-967F-2B22A229592E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"66E89655-FE9E-4B05-8DF9-59894B81B6D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B9A75D8-CFA6-4605-A0CB-AA5EA2FA8316\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD841629-4ADC-4122-A7E1-AED505E48150\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A539AD7F-4D84-4F80-844E-0404813C9384\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A55F197-5A6E-48EE-8BB1-C75C19DCBE4E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AE9D5D3E-2565-42CD-9254-F7E5B1980F7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9DFC5300-4BF5-4204-8A6C-0B86998022D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02865EB9-AFA1-4584-B487-D510350F82D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E00006E6-1999-4967-8BE9-2B7265F3E6F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"61BD8C57-DD49-44C1-BD0A-0A1210C1BE57\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AF5CD573-D9CE-41E6-8FAB-7DBEA4E545F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2389B152-70AC-47A7-BDAE-3A7F0550E6C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A81DAE1-4633-46A9-8DC9-42E6EC1D641B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BE026B2-73D6-43AD-9003-B159992D0323\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ACCCDDDA-58C9-443A-9D7F-44D362E363C1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0AC30F6B-4170-4FBF-AA69-B6BBE25EC3C8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1337152-04D4-4439-8F49-B6BCE271A3AC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A730DE04-9886-4920-A210-6C41CD77E330\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8A7F491-499A-4E1B-B5DB-FC1186DD6672\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CAEE2341-00C0-48D7-867F-DF18D4BBEE27\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"450890EF-3950-4603-8402-BBD539D6CF4F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DF30FFB0-19E7-4385-A752-BEAD0A085CC1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C00098D5-9696-499A-8048-31FD4021CB8C\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"The XMPP protocol plugin in libpurple in Pidgin before 2.10.8 does not properly determine whether the from address in an iq reply is consistent with the to address in an iq request, which allows remote attackers to spoof iq traffic or cause a denial of service (NULL pointer dereference and application crash) via a crafted reply.\"}, {\"lang\": \"es\", \"value\": \"El plugin del protocolo XMPP en libpurple en Pidgin anterior a 2.10.8 no determina adecuadamente si la direcci\\u00f3n origen en una respuesta iq es consistente con la direcci\\u00f3n destino en una solicitud iq, lo que permite a atacantes remotos falsificar tr\\u00e1fico iq o causar una denegaci\\u00f3n de servicio (referencia a un puntero NULL y ca\\u00edda de la aplicaci\\u00f3n) a trav\\u00e9s de una respuesta manipulada.\"}]",
      "id": "CVE-2013-6483",
      "lastModified": "2024-11-21T01:59:19.060",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:P/A:P\", \"baseScore\": 6.4, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 4.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2014-02-06T16:10:58.717",
      "references": "[{\"url\": \"http://hg.pidgin.im/pidgin/main/rev/93d4bff19574\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://pidgin.im/news/security/?id=78\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.debian.org/security/2014/dsa-2859\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.ubuntu.com/usn/USN-2100-1\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://rhn.redhat.com/errata/RHSA-2014-0139.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://hg.pidgin.im/pidgin/main/rev/93d4bff19574\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://pidgin.im/news/security/?id=78\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.debian.org/security/2014/dsa-2859\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ubuntu.com/usn/USN-2100-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://rhn.redhat.com/errata/RHSA-2014-0139.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "secalert@redhat.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2013-6483\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2014-02-06T16:10:58.717\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The XMPP protocol plugin in libpurple in Pidgin before 2.10.8 does not properly determine whether the from address in an iq reply is consistent with the to address in an iq request, which allows remote attackers to spoof iq traffic or cause a denial of service (NULL pointer dereference and application crash) via a crafted reply.\"},{\"lang\":\"es\",\"value\":\"El plugin del protocolo XMPP en libpurple en Pidgin anterior a 2.10.8 no determina adecuadamente si la direcci\u00f3n origen en una respuesta iq es consistente con la direcci\u00f3n destino en una solicitud iq, lo que permite a atacantes remotos falsificar tr\u00e1fico iq o causar una denegaci\u00f3n de servicio (referencia a un puntero NULL y ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de una respuesta manipulada.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:P/A:P\",\"baseScore\":6.4,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.7\",\"matchCriteriaId\":\"1566CF06-79F8-4293-87C4-419C35A85BF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBC2EBF3-73A7-4542-8E9C-47A4241A224C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF62072D-4956-4FE6-931E-E6EE9C49F3E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6499D8D5-0801-498C-BD4D-508506918CEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73CC76CD-FF35-4B3A-9F1E-4E5A65963057\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F694A1FC-2F10-48F9-8E8D-C88A8E7397AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D22A117-78BE-4BAC-8A2A-6C00C9E3A4C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59E216BC-29E4-4C31-9CF0-DE22C2E84968\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BD203F7-B983-4FDD-9837-D68D4F388A4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB90B7CB-1A11-45A8-B0BC-9B2143D84A2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C8E3CBA-2B33-49EF-9105-8DDBB938F519\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72AA3282-CA7D-438C-A07C-A63392333630\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEEFF420-2868-422B-BD22-9A5749C2398F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B139D83D-7D18-42C7-988C-2070B66CB943\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"047D9636-BCCE-4956-B5A3-D276F1C2EF2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A8A794E-E1CB-4F0F-9739-D625E94EA566\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E64EEEA0-89CE-46BD-B387-A96521E76A6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6E96AA3-B567-4E97-979A-D97A4F786D55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09C407C0-99A2-477B-87CF-6BE9F7B367E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBEF0457-39D8-465B-86A7-8DFA44A1F820\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E593BFF0-650E-4EDB-BF65-C509C8A807C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E39468D5-1378-4441-B927-5C34C85B18AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C80012AD-8F49-4287-8AEC-C21AC5774CA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CB3CF0C-BECE-4685-A370-96424B0A5703\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D5BC0FC-2F7D-41BE-83E4-AEDACD71F427\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8321D92-B935-4C2A-81B1-5984BFF4FD57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43679F1D-E48D-483B-A67B-9DB8C641F649\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00032CBA-479E-4880-ACAE-3B0F066C8146\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DB3EA73-7CF5-4010-9346-25C728E5225E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B11BCF7-3127-4B2E-967F-2B22A229592E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66E89655-FE9E-4B05-8DF9-59894B81B6D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B9A75D8-CFA6-4605-A0CB-AA5EA2FA8316\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD841629-4ADC-4122-A7E1-AED505E48150\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A539AD7F-4D84-4F80-844E-0404813C9384\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A55F197-5A6E-48EE-8BB1-C75C19DCBE4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE9D5D3E-2565-42CD-9254-F7E5B1980F7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DFC5300-4BF5-4204-8A6C-0B86998022D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02865EB9-AFA1-4584-B487-D510350F82D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E00006E6-1999-4967-8BE9-2B7265F3E6F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61BD8C57-DD49-44C1-BD0A-0A1210C1BE57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF5CD573-D9CE-41E6-8FAB-7DBEA4E545F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2389B152-70AC-47A7-BDAE-3A7F0550E6C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A81DAE1-4633-46A9-8DC9-42E6EC1D641B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BE026B2-73D6-43AD-9003-B159992D0323\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACCCDDDA-58C9-443A-9D7F-44D362E363C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AC30F6B-4170-4FBF-AA69-B6BBE25EC3C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1337152-04D4-4439-8F49-B6BCE271A3AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A730DE04-9886-4920-A210-6C41CD77E330\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8A7F491-499A-4E1B-B5DB-FC1186DD6672\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAEE2341-00C0-48D7-867F-DF18D4BBEE27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"450890EF-3950-4603-8402-BBD539D6CF4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF30FFB0-19E7-4385-A752-BEAD0A085CC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C00098D5-9696-499A-8048-31FD4021CB8C\"}]}]}],\"references\":[{\"url\":\"http://hg.pidgin.im/pidgin/main/rev/93d4bff19574\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://pidgin.im/news/security/?id=78\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2014/dsa-2859\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2100-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2014-0139.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://hg.pidgin.im/pidgin/main/rev/93d4bff19574\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://pidgin.im/news/security/?id=78\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2014/dsa-2859\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2100-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2014-0139.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…