CVE-2015-8688

Gajim before 0.16.5 allows remote attackers to modify the roster and intercept messages via a crafted roster-push IQ stanza.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gajim:gajim:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:38

Type Values Removed Values Added
References () http://gultsch.de/gajim_roster_push_and_message_interception.html - () http://gultsch.de/gajim_roster_push_and_message_interception.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175503.html - () http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175503.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175526.html - () http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175526.html -
References () http://lists.opensuse.org/opensuse-updates/2016-01/msg00027.html - () http://lists.opensuse.org/opensuse-updates/2016-01/msg00027.html -
References () http://www.debian.org/security/2016/dsa-3492 - () http://www.debian.org/security/2016/dsa-3492 -
References () https://hg.gajim.org/gajim/file/gajim-0.16.5/ChangeLog - Vendor Advisory () https://hg.gajim.org/gajim/file/gajim-0.16.5/ChangeLog - Vendor Advisory

Information

Published : 2016-01-15 19:59

Updated : 2024-11-21 02:38


NVD link : CVE-2015-8688

Mitre link : CVE-2015-8688

CVE.ORG link : CVE-2015-8688


JSON object : View

Products Affected

gajim

  • gajim
CWE
CWE-20

Improper Input Validation