Name | CVE-2016-9928 |
Description | MCabber before 1.0.4 is vulnerable to roster push attacks, which allows remote attackers to intercept communications, or add themselves as an entity on a 3rd party's roster as another user, which will also garner associated privileges, via crafted XMPP packets. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-2260-1, DLA-724-1 |
Debian Bugs | 845258 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
mcabber (PTS) | bullseye | 1.1.2-1 | fixed |
sid, trixie, bookworm | 1.1.2-2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
mcabber | source | wheezy | 0.10.1-3+deb7u1 | DLA-724-1 | ||
mcabber | source | jessie | 0.10.2-1+deb8u1 | DLA-2260-1 | ||
mcabber | source | (unstable) | 0.10.2-1.1 | 845258 |
https://bitbucket.org/McKael/mcabber-crew/commits/6e1ead98930d7dd0a520ad17c720ae4908429033/raw
Similar issue for mcabber as for gajim in CVE-2015-8688
https://www.openwall.com/lists/oss-security/2016/12/09/5