Gajim through 0.16.7 unconditionally implements the "XEP-0146: Remote Controlling Clients" extension. This can be abused by malicious XMPP servers to, for example, extract plaintext from OTR encrypted sessions.
References
Link | Resource |
---|---|
http://www.debian.org/security/2017/dsa-3943 | |
https://bugs.debian.org/863445 | Third Party Advisory |
https://dev.gajim.org/gajim/gajim/commit/cb65cfc5aed9efe05208ebbb7fb2d41fcf7253cc | Patch Vendor Advisory |
https://dev.gajim.org/gajim/gajim/issues/8378 | Patch Vendor Advisory |
https://mail.jabber.org/pipermail/standards/2016-August/031335.html | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/201707-14 | |
http://www.debian.org/security/2017/dsa-3943 | |
https://bugs.debian.org/863445 | Third Party Advisory |
https://dev.gajim.org/gajim/gajim/commit/cb65cfc5aed9efe05208ebbb7fb2d41fcf7253cc | Patch Vendor Advisory |
https://dev.gajim.org/gajim/gajim/issues/8378 | Patch Vendor Advisory |
https://mail.jabber.org/pipermail/standards/2016-August/031335.html | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/201707-14 |
Configurations
History
21 Nov 2024, 02:43
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.debian.org/security/2017/dsa-3943 - | |
References | () https://bugs.debian.org/863445 - Third Party Advisory | |
References | () https://dev.gajim.org/gajim/gajim/commit/cb65cfc5aed9efe05208ebbb7fb2d41fcf7253cc - Patch, Vendor Advisory | |
References | () https://dev.gajim.org/gajim/gajim/issues/8378 - Patch, Vendor Advisory | |
References | () https://mail.jabber.org/pipermail/standards/2016-August/031335.html - Mailing List, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201707-14 - |
Information
Published : 2017-05-28 00:29
Updated : 2024-11-21 02:43
NVD link : CVE-2016-10376
Mitre link : CVE-2016-10376
CVE.ORG link : CVE-2016-10376
JSON object : View
Products Affected
gajim
- gajim
CWE
CWE-310
Cryptographic Issues