Unrated severityNVD Advisory· Published Feb 6, 2020· Updated Aug 6, 2024
CVE-2016-9928
CVE-2016-9928
Description
MCabber before 1.0.4 is vulnerable to roster push attacks, which allows remote attackers to intercept communications, or add themselves as an entity on a 3rd party's roster as another user, which will also garner associated privileges, via crafted XMPP packets.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- usn.ubuntu.com/4506-1/mitrevendor-advisoryx_refsource_UBUNTU
- lists.opensuse.org/opensuse-updates/2017-01/msg00130.htmlmitrex_refsource_CONFIRM
- www.openwall.com/lists/oss-security/2016/12/11/2mitrex_refsource_MISC
- www.openwall.com/lists/oss-security/2017/02/09/29mitrex_refsource_MISC
- www.securityfocus.com/bid/94862mitrex_refsource_MISC
- bitbucket.org/McKael/mcabber-crew/commits/6e1ead98930d7dd0a520ad17c720ae4908429033/rawmitrex_refsource_CONFIRM
- bugs.debian.org/cgi-bin/bugreport.cgimitrex_refsource_CONFIRM
- bugzilla.redhat.com/show_bug.cgimitrex_refsource_CONFIRM
- gultsch.de/gajim_roster_push_and_message_interception.htmlmitrex_refsource_MISC
- lists.debian.org/debian-lts-announce/2020/06/msg00031.htmlmitremailing-listx_refsource_MLIST
News mentions
0No linked articles in our index yet.