← Back to CVEs
CVE-2016-9928
HIGH7.4
Description
MCabber before 1.0.4 is vulnerable to roster push attacks, which allows remote attackers to intercept communications, or add themselves as an entity on a 3rd party's roster as another user, which will also garner associated privileges, via crafted XMPP packets.
CVE Details
CVSS v3.1 Score7.4
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Attack VectorNETWORK
ComplexityHIGH
Privileges RequiredNONE
User InteractionNONE
Published2/6/2020
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
canonical:ubuntu_linuxdebian:debian_linuxmcabber:mcabber
Weaknesses (CWE)
CWE-269
References
http://lists.opensuse.org/opensuse-updates/2017-01/msg00130.html(security@debian.org)
http://www.openwall.com/lists/oss-security/2016/12/11/2(security@debian.org)
http://www.openwall.com/lists/oss-security/2017/02/09/29(security@debian.org)
http://www.securityfocus.com/bid/94862(security@debian.org)
https://bitbucket.org/McKael/mcabber-crew/commits/6e1ead98930d7dd0a520ad17c720ae4908429033/raw(security@debian.org)
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845258(security@debian.org)
https://bugzilla.redhat.com/show_bug.cgi?id=1403790(security@debian.org)
https://gultsch.de/gajim_roster_push_and_message_interception.html(security@debian.org)
https://lists.debian.org/debian-lts-announce/2020/06/msg00031.html(security@debian.org)
https://usn.ubuntu.com/4506-1/(security@debian.org)
http://lists.opensuse.org/opensuse-updates/2017-01/msg00130.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2016/12/11/2(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2017/02/09/29(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/94862(af854a3a-2127-422b-91ae-364da2661108)
https://bitbucket.org/McKael/mcabber-crew/commits/6e1ead98930d7dd0a520ad17c720ae4908429033/raw(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845258(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=1403790(af854a3a-2127-422b-91ae-364da2661108)
https://gultsch.de/gajim_roster_push_and_message_interception.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2020/06/msg00031.html(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4506-1/(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.