Vulnerability Details : CVE-2012-6152
The Yahoo! protocol plugin in libpurple in Pidgin before 2.10.8 does not properly validate UTF-8 data, which allows remote attackers to cause a denial of service (application crash) via crafted byte sequences.
Vulnerability category: Input validationDenial of service
Products affected by CVE-2012-6152
- cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*
- cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-6152
2.28%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 88 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-6152
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2012-6152
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-6152
-
http://www.ubuntu.com/usn/USN-2100-1
USN-2100-1: Pidgin vulnerabilities | Ubuntu security notices
-
https://rhn.redhat.com/errata/RHSA-2014-0139.html
RHSA-2014:0139 - Security Advisory - Red Hat Customer Portal
-
http://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html
openSUSE-SU-2014:0239-1: moderate: update for pidgin, pidgin-branding-op
-
http://hg.pidgin.im/pidgin/main/rev/b0345c25f886
pidgin — Bitbucket
-
http://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html
openSUSE-SU-2014:0326-1: moderate: update for pidgin
-
http://pidgin.im/news/security/?id=70
Pidgin Security AdvisoriesVendor Advisory
Jump to