|
|
Subscribe / Log in / New account

Arch Linux alert ASA-201706-4 (gajim)

From:  Santiago Torres-Arias <santiago@archlinux.org>
To:  Archlinux security <arch-security@archlinux.org>
Subject:  [arch-security] [ASA-201706-4] gajim: information disclosure
Date:  Mon, 5 Jun 2017 10:38:49 -0400
Message-ID:  <20170605143849.ezlvfaltk3homq4g@riseup.net>

Arch Linux Security Advisory ASA-201706-4 ========================================= Severity: High Date : 2017-06-05 CVE-ID : CVE-2016-1037 Package : gajim Type : information disclosure Remote : Yes Link : https://security.archlinux.org/AVG-284 Summary ======= The package gajim before version 0.16.8-1 is vulnerable to information disclosure. Resolution ========== Upgrade to 0.16.8-1. # pacman -Syu "gajim>=0.16.8-1" The problem has been fixed upstream in version 0.16.8. Workaround ========== None. Description =========== Gajim through 0.16.7 unconditionally implements the "XEP-0146: Remote Controlling Clients" extension. This can be abused by malicious XMPP servers to, for example, extract plaintext from OTR encrypted sessions. Impact ====== A malicious attacker can extract user session data by leveraging the XEP-0146 (remote controlling clients) feature of the XMPP protocol, which is enabled by default. References ========== https://dev.gajim.org/gajim/gajim/issues/8378 https://dev.gajim.org/gajim/gajim/commit/cb65cfc5aed9efe0... https://security.archlinux.org/CVE-2016-1037


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds