{"id":"ALPINE-CVE-2017-2640","details":"An out-of-bounds write flaw was found in the way Pidgin before 2.12.0 processed XML content. A malicious remote server could potentially use this flaw to crash Pidgin or execute arbitrary code in the context of the pidgin process.","modified":"2026-03-09T01:06:05.540829Z","published":"2018-07-27T18:29:00.970Z","upstream":["CVE-2017-2640"],"references":[{"type":"ADVISORY","url":"https://security.alpinelinux.org/vuln/CVE-2017-2640"}],"affected":[{"package":{"name":"pidgin","ecosystem":"Alpine:v3.2","purl":"pkg:apk/alpine/pidgin?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.10.11-r1"}]}],"versions":["2.10.0-r0","2.10.0-r1","2.10.0-r2","2.10.0-r3","2.10.0-r4","2.10.1-r0","2.10.10-r0","2.10.11-r0","2.10.2-r0","2.10.3-r0","2.10.3-r1","2.10.4-r0","2.10.5-r0","2.10.6-r0","2.10.6-r1","2.10.6-r2","2.10.6-r3","2.10.7-r0","2.10.7-r1","2.10.7-r2","2.10.8-r0","2.10.9-r0","2.7.0-r0","2.7.0-r1","2.7.1-r0","2.7.10-r0","2.7.11-r0","2.7.11-r1","2.7.11-r2","2.7.2-r0","2.7.3-r0","2.7.4-r0","2.7.5-r0","2.7.6-r0","2.7.7-r0","2.7.8-r0","2.7.9-r0","2.7.9-r1","2.7.9-r2","2.8.0-r0","2.9.0-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2017-2640.json"}},{"package":{"name":"pidgin","ecosystem":"Alpine:v3.3","purl":"pkg:apk/alpine/pidgin?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.10.11-r3"}]}],"versions":["2.10.0-r0","2.10.0-r1","2.10.0-r2","2.10.0-r3","2.10.0-r4","2.10.1-r0","2.10.10-r0","2.10.11-r0","2.10.11-r1","2.10.11-r2","2.10.2-r0","2.10.3-r0","2.10.3-r1","2.10.4-r0","2.10.5-r0","2.10.6-r0","2.10.6-r1","2.10.6-r2","2.10.6-r3","2.10.7-r0","2.10.7-r1","2.10.7-r2","2.10.8-r0","2.10.9-r0","2.7.0-r0","2.7.0-r1","2.7.1-r0","2.7.10-r0","2.7.11-r0","2.7.11-r1","2.7.11-r2","2.7.2-r0","2.7.3-r0","2.7.4-r0","2.7.5-r0","2.7.6-r0","2.7.7-r0","2.7.8-r0","2.7.9-r0","2.7.9-r1","2.7.9-r2","2.8.0-r0","2.9.0-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2017-2640.json"}},{"package":{"name":"pidgin","ecosystem":"Alpine:v3.4","purl":"pkg:apk/alpine/pidgin?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.11.0-r1"}]}],"versions":["2.10.0-r0","2.10.0-r1","2.10.0-r2","2.10.0-r3","2.10.0-r4","2.10.1-r0","2.10.10-r0","2.10.11-r0","2.10.11-r1","2.10.11-r2","2.10.12-r0","2.10.2-r0","2.10.3-r0","2.10.3-r1","2.10.4-r0","2.10.5-r0","2.10.6-r0","2.10.6-r1","2.10.6-r2","2.10.6-r3","2.10.7-r0","2.10.7-r1","2.10.7-r2","2.10.8-r0","2.10.9-r0","2.11.0-r0","2.7.0-r0","2.7.0-r1","2.7.1-r0","2.7.10-r0","2.7.11-r0","2.7.11-r1","2.7.11-r2","2.7.2-r0","2.7.3-r0","2.7.4-r0","2.7.5-r0","2.7.6-r0","2.7.7-r0","2.7.8-r0","2.7.9-r0","2.7.9-r1","2.7.9-r2","2.8.0-r0","2.9.0-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2017-2640.json"}},{"package":{"name":"pidgin","ecosystem":"Alpine:v3.5","purl":"pkg:apk/alpine/pidgin?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.11.0-r1"}]}],"versions":["2.10.0-r0","2.10.0-r1","2.10.0-r2","2.10.0-r3","2.10.0-r4","2.10.1-r0","2.10.10-r0","2.10.11-r0","2.10.11-r1","2.10.11-r2","2.10.12-r0","2.10.2-r0","2.10.3-r0","2.10.3-r1","2.10.4-r0","2.10.5-r0","2.10.6-r0","2.10.6-r1","2.10.6-r2","2.10.6-r3","2.10.7-r0","2.10.7-r1","2.10.7-r2","2.10.8-r0","2.10.9-r0","2.11.0-r0","2.7.0-r0","2.7.0-r1","2.7.1-r0","2.7.10-r0","2.7.11-r0","2.7.11-r1","2.7.11-r2","2.7.2-r0","2.7.3-r0","2.7.4-r0","2.7.5-r0","2.7.6-r0","2.7.7-r0","2.7.8-r0","2.7.9-r0","2.7.9-r1","2.7.9-r2","2.8.0-r0","2.9.0-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2017-2640.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}