CVE-2016-9928

NameCVE-2016-9928
DescriptionMCabber before 1.0.4 is vulnerable to roster push attacks, which allows remote attackers to intercept communications, or add themselves as an entity on a 3rd party's roster as another user, which will also garner associated privileges, via crafted XMPP packets.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2260-1, DLA-724-1
Debian Bugs845258

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
mcabber (PTS)bullseye1.1.2-1fixed
sid, trixie, bookworm1.1.2-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
mcabbersourcewheezy0.10.1-3+deb7u1DLA-724-1
mcabbersourcejessie0.10.2-1+deb8u1DLA-2260-1
mcabbersource(unstable)0.10.2-1.1845258

Notes

https://bitbucket.org/McKael/mcabber-crew/commits/6e1ead98930d7dd0a520ad17c720ae4908429033/raw
Similar issue for mcabber as for gajim in CVE-2015-8688
https://www.openwall.com/lists/oss-security/2016/12/09/5

Search for package or bug name: Reporting problems