CVE-2013-6483

N/A Unknown
Published: February 06, 2014 Modified: April 29, 2026
View on NVD

Description

The XMPP protocol plugin in libpurple in Pidgin before 2.10.8 does not properly determine whether the from address in an iq reply is consistent with the to address in an iq request, which allows remote attackers to spoof iq traffic or cause a denial of service (NULL pointer dereference and application crash) via a crafted reply.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://pidgin.im/news/security/?id=78
Source: secalert@redhat.com
Vendor Advisory
http://www.ubuntu.com/usn/USN-2100-1
Source: secalert@redhat.com
http://hg.pidgin.im/pidgin/main/rev/93d4bff19574
Source: af854a3a-2127-422b-91ae-364da2661108
http://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://pidgin.im/news/security/?id=78
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.debian.org/security/2014/dsa-2859
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/USN-2100-1
Source: af854a3a-2127-422b-91ae-364da2661108
https://rhn.redhat.com/errata/RHSA-2014-0139.html
Source: af854a3a-2127-422b-91ae-364da2661108

14 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.9%
75th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

pidgin