Lucene search

K
osvGoogleOSV:DLA-724-1
HistoryNov 27, 2016 - 12:00 a.m.

mcabber - security update

2016-11-2700:00:00
Google
osv.dev
6

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

It was discovered that there was a roster push attack [0] in mcabber, a
console-based Jabber (XMPP) client.

For Debian 7 Wheezy, this issue has been fixed in mcabber version
0.10.1-3+deb7u1.

We recommend that you upgrade your mcabber packages.

[0] <https://gultsch.de/gajim_roster_push_and_message_interception.html&gt;

CPENameOperatorVersion
mcabbereq0.10.1-3

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N