2 results (0.010 seconds)

CVSS: 5.0EPSS: 0%CPEs: 8EXPL: 0

A certain hashing algorithm in Telepathy Gabble 0.16.x before 0.16.5 and 0.17.x before 0.17.3 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted message. Un algoritmo de hash concreto en Telepathy Gabble 0.16.x anterior a la versión 0.16.5 y 0.17.x anterior a 0.17.3 permite a atacantes remotos provocar una denegación de servicio (dereferencia a puntero nulo y caída) a través de un mensaje manipulado. • http://lists.freedesktop.org/archives/telepathy/2013-March/006377.html http://lists.freedesktop.org/archives/telepathy/2013-March/006378.html http://lists.opensuse.org/opensuse-updates/2013-03/msg00085.html http://secunia.com/advisories/53779 http://www.ubuntu.com/usn/USN-1873-1 • CWE-310: Cryptographic Issues •

CVSS: 6.8EPSS: 0%CPEs: 10EXPL: 0

The Wocky module in Telepathy Gabble before 0.16.6 and 0.17.x before 0.17.4, when connecting to a "legacy Jabber server," does not properly enforce the WockyConnector:tls-required flag, which allows remote attackers to bypass TLS verification and perform a man-in-the-middle attacks. El módulo Wocky de Telepathy Gabble anteriores a 0.16.6 y 0.17.x anteriores a 0.17.4, al conectarse a "legacy Jabber server", no hace respetar apropiadamente la bandera WockyConnector.tls-required, lo cual permite a atacantes remotos sortear la verificación TLS y ejecutar ataques man-in-the-middle. • http://seclists.org/oss-sec/2013/q2/438 http://secunia.com/advisories/53779 http://www.debian.org/security/2013/dsa-2702 http://www.ubuntu.com/usn/USN-1873-1 https://bugs.freedesktop.org/show_bug.cgi?id=65036 • CWE-20: Improper Input Validation •