ID CVE-2016-10376
Summary Gajim through 0.16.7 unconditionally implements the "XEP-0146: Remote Controlling Clients" extension. This can be abused by malicious XMPP servers to, for example, extract plaintext from OTR encrypted sessions.
References
Vulnerable Configurations
  • cpe:2.3:a:gajim:gajim:0.1:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.2:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.3:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.4:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.5:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.6:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.7:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.8:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.8.2:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.8.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.9:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.9.1:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.9.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.10:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.10:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.10.1:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.10.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.11:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.11:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.11.1:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.11.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.11.2:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.11.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.11.3:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.11.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.11.4:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.11.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.12:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.12:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.12.1:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.12.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.12.2:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.12.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.12.3:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.12.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.12.4:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.12.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.12.5:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.12.5:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.12.5:alpha1:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.12.5:alpha1:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.12.5:beta1:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.12.5:beta1:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.13:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.13:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.13.1:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.13.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.13.2:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.13.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.13.3:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.13.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.13.4:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.13.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.14:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.14:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.14.1:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.14.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.14.2:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.14.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.14.3:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.14.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.14.4:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.14.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.15:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.15:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.15.1:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.15.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.15.2:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.15.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.15.3:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.15.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.15.4:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.15.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.16.4:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.16.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gajim:gajim:0.16.7:*:*:*:*:*:*:*
    cpe:2.3:a:gajim:gajim:0.16.7:*:*:*:*:*:*:*
CVSS
Base: 3.5 (as of 06-11-2017 - 02:29)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK MEDIUM SINGLE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:M/Au:S/C:P/I:N/A:N
refmap via4
debian DSA-3943
gentoo GLSA-201707-14
misc
Last major update 06-11-2017 - 02:29
Published 28-05-2017 - 00:29
Last modified 06-11-2017 - 02:29
Back to Top