CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N
AI Score
Confidence
High
EPSS
Percentile
72.8%
Debian Security Advisory DSA-5379-1 [email protected]
https://www.debian.org/security/ Salvatore Bonaccorso
March 27, 2023 https://www.debian.org/security/faq
Package : dino-im
CVE ID : CVE-2023-28686
Debian Bug : 1033370
Kim Alvefur discovered that insufficient message sender validation in
dino-im, a modern XMPP/Jabber client, may result in manipulation of
entries in the personal bookmark store without user interaction via a
specially crafted message. Additionally an attacker can take advantage
of this flaw to change how group chats are displayed or force a user to
join or leave an attacker-selected groupchat.
For the stable distribution (bullseye), this problem has been fixed in
version 0.2.0-3+deb11u1.
We recommend that you upgrade your dino-im packages.
For the detailed security status of dino-im please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/dino-im
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 11 | mipsel | dino-im-dbgsym | < 0.2.0-3+deb11u1 | dino-im-dbgsym_0.2.0-3+deb11u1_mipsel.deb |
Debian | 11 | amd64 | dino-im | < 0.2.0-3+deb11u1 | dino-im_0.2.0-3+deb11u1_amd64.deb |
Debian | 11 | mips64el | dino-im | < 0.2.0-3+deb11u1 | dino-im_0.2.0-3+deb11u1_mips64el.deb |
Debian | 11 | mipsel | dino-im | < 0.2.0-3+deb11u1 | dino-im_0.2.0-3+deb11u1_mipsel.deb |
Debian | 11 | mips64el | dino-im-dbgsym | < 0.2.0-3+deb11u1 | dino-im-dbgsym_0.2.0-3+deb11u1_mips64el.deb |
Debian | 11 | amd64 | dino-im-dbgsym | < 0.2.0-3+deb11u1 | dino-im-dbgsym_0.2.0-3+deb11u1_amd64.deb |
Debian | 11 | all | dino-im-common | < 0.2.0-3+deb11u1 | dino-im-common_0.2.0-3+deb11u1_all.deb |
Debian | 11 | armhf | dino-im-dbgsym | < 0.2.0-3+deb11u1 | dino-im-dbgsym_0.2.0-3+deb11u1_armhf.deb |
Debian | 11 | s390x | dino-im | < 0.2.0-3+deb11u1 | dino-im_0.2.0-3+deb11u1_s390x.deb |
Debian | 11 | ppc64el | dino-im-dbgsym | < 0.2.0-3+deb11u1 | dino-im-dbgsym_0.2.0-3+deb11u1_ppc64el.deb |
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N
AI Score
Confidence
High
EPSS
Percentile
72.8%