6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.016 Low
EPSS
Percentile
87.3%
Severity: Medium
Date : 2021-02-20
CVE-ID : CVE-2021-27229
Package : mumble
Type : arbitrary code execution
Remote : Yes
Link : https://security.archlinux.org/AVG-1576
The package mumble before version 1.3.4-1 is vulnerable to arbitrary
code execution.
Upgrade to 1.3.4-1.
The problem has been fixed upstream in version 1.3.4.
None.
Mumble before 1.3.4 allows remote code execution if a victim navigates
to a crafted URL on a server list and clicks on the Open Webpage text.
A remote attacker is able to execute arbitrary code by tricking the
user into opening the web page text of a server list.
https://github.com/mumble-voip/mumble/pull/4733
https://github.com/mumble-voip/mumble/commit/e59ee87abe249f345908c7d568f6879d16bfd648
https://security.archlinux.org/CVE-2021-27229
6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.016 Low
EPSS
Percentile
87.3%