6.8
CVSSv2

CVE-2013-1431

Published: 23/09/2013 Updated: 08/11/2016
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

The Wocky module in Telepathy Gabble prior to 0.16.6 and 0.17.x prior to 0.17.4, when connecting to a "legacy Jabber server," does not properly enforce the WockyConnector:tls-required flag, which allows remote malicious users to bypass TLS verification and perform a man-in-the-middle attacks.

Vulnerable Product Search on Vulmon Subscribe to Product

simon mcvittie telepathy gabble

simon mcvittie telepathy gabble 0.16.3

simon mcvittie telepathy gabble 0.16.1

simon mcvittie telepathy gabble 0.16.0

simon mcvittie telepathy gabble 0.17.3

simon mcvittie telepathy gabble 0.17.2

simon mcvittie telepathy gabble 0.17.1

simon mcvittie telepathy gabble 0.17.0

simon mcvittie telepathy gabble 0.16.4

simon mcvittie telepathy gabble 0.16.2

Vendor Advisories

Several security issues were fixed in telepathy-gabble ...
Maksim Otstavnov discovered that the Wocky submodule used by telepathy-gabble, the Jabber/XMPP connection manager for the Telepathy framework, does not respect the tls-required flag on legacy Jabber servers A network intermediary could use this vulnerability to bypass TLS verification and perform a man-in-the-middle attack For the oldstable distr ...