Lucene search

K
freebsdFreeBSDA3C2DEE5-CDB9-11E2-B9CE-080027019BE0
HistoryMay 27, 2013 - 12:00 a.m.

telepathy-gabble -- TLS verification bypass

2013-05-2700:00:00
vuxml.freebsd.org
14

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

EPSS

0.005

Percentile

76.9%

Simon McVittie reports:

This release fixes a man-in-the-middle attack.
If you use an unencrypted connection to a “legacy Jabber”
(pre-XMPP) server, this version of Gabble will not connect
until you make one of these configuration changes:
. upgrade the server software to something that supports XMPP 1.0; or
. use an encrypted “old SSL” connection, typically on port 5223
(old-ssl); or
. turn off “Encryption required (TLS/SSL)” (require-encryption).

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchtelepathy-gabble< 0.16.6UNKNOWN

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

EPSS

0.005

Percentile

76.9%