CVE-2011-1000

jingle-factory.c in Telepathy Gabble 0.11 before 0.11.7, 0.10 before 0.10.5, and 0.8 before 0.8.15 allows remote attackers to sniff audio and video calls via a crafted google:jingleinfo stanza that specifies an alternate server for streamed media.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054324.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054409.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054575.html
http://secunia.com/advisories/43316 Vendor Advisory
http://secunia.com/advisories/43369 Vendor Advisory
http://secunia.com/advisories/43404 Vendor Advisory
http://secunia.com/advisories/43485
http://secunia.com/advisories/43545
http://secunia.com/advisories/44023
http://www.debian.org/security/2011/dsa-2169
http://www.openwall.com/lists/oss-security/2011/02/17/4 Patch
http://www.openwall.com/lists/oss-security/2011/02/17/7 Patch
http://www.securityfocus.com/bid/46440
http://www.ubuntu.com/usn/USN-1067-1
http://www.vupen.com/english/advisories/2011/0412 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0428 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0537
http://www.vupen.com/english/advisories/2011/0572
http://www.vupen.com/english/advisories/2011/0901
https://bugs.freedesktop.org/show_bug.cgi?id=34048 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/65523
https://hermes.opensuse.org/messages/7848248
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054324.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054409.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054575.html
http://secunia.com/advisories/43316 Vendor Advisory
http://secunia.com/advisories/43369 Vendor Advisory
http://secunia.com/advisories/43404 Vendor Advisory
http://secunia.com/advisories/43485
http://secunia.com/advisories/43545
http://secunia.com/advisories/44023
http://www.debian.org/security/2011/dsa-2169
http://www.openwall.com/lists/oss-security/2011/02/17/4 Patch
http://www.openwall.com/lists/oss-security/2011/02/17/7 Patch
http://www.securityfocus.com/bid/46440
http://www.ubuntu.com/usn/USN-1067-1
http://www.vupen.com/english/advisories/2011/0412 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0428 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0537
http://www.vupen.com/english/advisories/2011/0572
http://www.vupen.com/english/advisories/2011/0901
https://bugs.freedesktop.org/show_bug.cgi?id=34048 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/65523
https://hermes.opensuse.org/messages/7848248
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:freedesktop:telepathy_gabble:0.11:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:telepathy_gabble:0.11.1:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:telepathy_gabble:0.11.2:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:telepathy_gabble:0.11.3:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:telepathy_gabble:0.11.4:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:telepathy_gabble:0.11.5:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:telepathy_gabble:0.11.6:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:freedesktop:telepathy_gabble:0.10:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:telepathy_gabble:0.10.1:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:telepathy_gabble:0.10.2:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:telepathy_gabble:0.10.3:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:telepathy_gabble:0.10.4:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:freedesktop:telepathy_gabble:0.8:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:telepathy_gabble:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:telepathy_gabble:0.8.2:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:telepathy_gabble:0.8.3:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:telepathy_gabble:0.8.4:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:telepathy_gabble:0.8.5:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:telepathy_gabble:0.8.6:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:telepathy_gabble:0.8.7:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:telepathy_gabble:0.8.8:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:telepathy_gabble:0.8.9:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:telepathy_gabble:0.8.10:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:telepathy_gabble:0.8.11:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:telepathy_gabble:0.8.12:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:telepathy_gabble:0.8.13:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:telepathy_gabble:0.8.14:*:*:*:*:*:*:*

History

21 Nov 2024, 01:25

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054324.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054324.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054409.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054409.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054575.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054575.html -
References () http://secunia.com/advisories/43316 - Vendor Advisory () http://secunia.com/advisories/43316 - Vendor Advisory
References () http://secunia.com/advisories/43369 - Vendor Advisory () http://secunia.com/advisories/43369 - Vendor Advisory
References () http://secunia.com/advisories/43404 - Vendor Advisory () http://secunia.com/advisories/43404 - Vendor Advisory
References () http://secunia.com/advisories/43485 - () http://secunia.com/advisories/43485 -
References () http://secunia.com/advisories/43545 - () http://secunia.com/advisories/43545 -
References () http://secunia.com/advisories/44023 - () http://secunia.com/advisories/44023 -
References () http://www.debian.org/security/2011/dsa-2169 - () http://www.debian.org/security/2011/dsa-2169 -
References () http://www.openwall.com/lists/oss-security/2011/02/17/4 - Patch () http://www.openwall.com/lists/oss-security/2011/02/17/4 - Patch
References () http://www.openwall.com/lists/oss-security/2011/02/17/7 - Patch () http://www.openwall.com/lists/oss-security/2011/02/17/7 - Patch
References () http://www.securityfocus.com/bid/46440 - () http://www.securityfocus.com/bid/46440 -
References () http://www.ubuntu.com/usn/USN-1067-1 - () http://www.ubuntu.com/usn/USN-1067-1 -
References () http://www.vupen.com/english/advisories/2011/0412 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/0412 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2011/0428 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/0428 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2011/0537 - () http://www.vupen.com/english/advisories/2011/0537 -
References () http://www.vupen.com/english/advisories/2011/0572 - () http://www.vupen.com/english/advisories/2011/0572 -
References () http://www.vupen.com/english/advisories/2011/0901 - () http://www.vupen.com/english/advisories/2011/0901 -
References () https://bugs.freedesktop.org/show_bug.cgi?id=34048 - Patch () https://bugs.freedesktop.org/show_bug.cgi?id=34048 - Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/65523 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/65523 -
References () https://hermes.opensuse.org/messages/7848248 - () https://hermes.opensuse.org/messages/7848248 -

Information

Published : 2011-02-19 01:00

Updated : 2024-11-21 01:25


NVD link : CVE-2011-1000

Mitre link : CVE-2011-1000

CVE.ORG link : CVE-2011-1000


JSON object : View

Products Affected

freedesktop

  • telepathy_gabble
CWE
CWE-20

Improper Input Validation