An exploitable out-of-bounds read exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT contact information sent from the server can result in memory disclosure.Referenceshttp://www.talosintelligence.com/reports/TALOS-2016-0143/http://www.securityfocus.com/bid/91335http://www.debian.org/security/2016/dsa-3620http://www.pidgin.im/news/security/?id=108https://security.gentoo.org/glsa/201701-38http://www.ubuntu.com/usn/USN-3031-1