Vulnerability Details : CVE-2012-2369
Format string vulnerability in the log_message_cb function in otr-plugin.c in the Off-the-Record Messaging (OTR) pidgin-otr plugin before 3.2.1 for Pidgin might allow remote attackers to execute arbitrary code via format string specifiers in data that generates a log message.
Vulnerability category: Execute code
Products affected by CVE-2012-2369
- cpe:2.3:a:cypherpunks:pidgin-otr:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-2369
2.39%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 84 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-2369
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2012-2369
-
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-2369
-
http://openwall.com/lists/oss-security/2012/05/16/2
oss-security - Format string security flaw in pidgin-otrPatch
-
http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00003.html
[security-announce] SUSE-SU-2012:0703-1: important: Security update for
-
http://www.debian.org/security/2012/dsa-2476
Debian -- Security Information -- DSA-2476-1 pidgin-otr
-
http://security.gentoo.org/glsa/glsa-201207-05.xml
pidgin-otr: Arbitrary code execution (GLSA 201207-05) — Gentoo security
Jump to