Novell Home

CVE-2013-6487

Common Vulnerabilities and Exposures

[Previous] [Index] [Next]

Upstream information

CVE-2013-6487 at MITRE

Description

Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg) parser in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a large Content-Length value, which triggers a buffer overflow.

NVD CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

Novell/SUSE information

Novell Bugzilla entry: 861019, 878540

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SLE 11 SP3 DEBUGINFO
  • libgadu-debuginfo >= 1.8.2-1.24.1
  • libgadu-debugsource >= 1.8.2-1.24.1
Builds
SAT Patch Nr: 9277
SUSE Linux Enterprise Software Development Kit 11 SP3
  • libgadu >= 1.8.2-1.24.1
  • libgadu-devel >= 1.8.2-1.24.1
Builds
SAT Patch Nr: 9277
SUSE Linux Enterprise Desktop 11 SP3
  • libgadu >= 1.8.2-1.24.1
Builds
SAT Patch Nr: 9277
SLE 11 SP3 DEBUGINFO
  • pidgin-debuginfo >= 2.6.6-0.23.1
  • pidgin-debugsource >= 2.6.6-0.23.1
Builds
SAT Patch Nr: 9213
SUSE Linux Enterprise Software Development Kit 11 SP3
  • finch >= 2.6.6-0.23.1
  • finch-devel >= 2.6.6-0.23.1
  • libpurple >= 2.6.6-0.23.1
  • libpurple-devel >= 2.6.6-0.23.1
  • libpurple-lang >= 2.6.6-0.23.1
  • pidgin >= 2.6.6-0.23.1
  • pidgin-devel >= 2.6.6-0.23.1
Builds
SAT Patch Nr: 9213
SUSE Linux Enterprise Desktop 11 SP3
  • finch >= 2.6.6-0.23.1
  • libpurple >= 2.6.6-0.23.1
  • libpurple-lang >= 2.6.6-0.23.1
  • libpurple-meanwhile >= 2.6.6-0.23.1
  • libpurple-tcl >= 2.6.6-0.23.1
  • pidgin >= 2.6.6-0.23.1
Builds
SAT Patch Nr: 9213

© 2014 Novell