Vulnerability Description
The Wocky module in Telepathy Gabble before 0.16.6 and 0.17.x before 0.17.4, when connecting to a "legacy Jabber server," does not properly enforce the WockyConnector:tls-required flag, which allows remote attackers to bypass TLS verification and perform a man-in-the-middle attacks.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Simon Mcvittie | Telepathy Gabble | <= 0.16.5 |
Related Weaknesses (CWE)
References
- http://seclists.org/oss-sec/2013/q2/438Mailing ListPatch
- http://secunia.com/advisories/53779Permissions RequiredThird Party Advisory
- http://www.debian.org/security/2013/dsa-2702Third Party Advisory
- http://www.ubuntu.com/usn/USN-1873-1Third Party Advisory
- https://bugs.freedesktop.org/show_bug.cgi?id=65036Patch
- http://seclists.org/oss-sec/2013/q2/438Mailing ListPatch
- http://secunia.com/advisories/53779Permissions RequiredThird Party Advisory
- http://www.debian.org/security/2013/dsa-2702Third Party Advisory
- http://www.ubuntu.com/usn/USN-1873-1Third Party Advisory
- https://bugs.freedesktop.org/show_bug.cgi?id=65036Patch
FAQ
What is CVE-2013-1431?
CVE-2013-1431 is a vulnerability with a CVSS score of 6.8 (MEDIUM). The Wocky module in Telepathy Gabble before 0.16.6 and 0.17.x before 0.17.4, when connecting to a "legacy Jabber server," does not properly enforce the WockyConnector:tls-required flag, which allows r...
How severe is CVE-2013-1431?
CVE-2013-1431 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-1431?
Check the references section above for vendor advisories and patch information. Affected products include: Simon Mcvittie Telepathy Gabble.