Vulnerability Description
The client in Mumble 1.2.x before 1.2.6 allows remote attackers to force the loading of an external file and cause a denial of service (hang and resource consumption) via a crafted string that is treated as rich-text by a Qt widget, as demonstrated by the (1) user or (2) channel name in a Qt dialog, (3) subject common name or (4) email address to the Certificate Wizard, or (5) server name in a tooltip.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mumble | Mumble | 1.2.0 |
Related Weaknesses (CWE)
References
- http://mumble.info/security/Mumble-SA-2014-006.txtVendor Advisory
- http://www.openwall.com/lists/oss-security/2014/05/15/1
- http://www.openwall.com/lists/oss-security/2014/05/15/4
- http://www.securityfocus.com/bid/67401
- http://mumble.info/security/Mumble-SA-2014-006.txtVendor Advisory
- http://www.openwall.com/lists/oss-security/2014/05/15/1
- http://www.openwall.com/lists/oss-security/2014/05/15/4
- http://www.securityfocus.com/bid/67401
FAQ
What is CVE-2014-3756?
CVE-2014-3756 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The client in Mumble 1.2.x before 1.2.6 allows remote attackers to force the loading of an external file and cause a denial of service (hang and resource consumption) via a crafted string that is trea...
How severe is CVE-2014-3756?
CVE-2014-3756 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-3756?
Check the references section above for vendor advisories and patch information. Affected products include: Mumble Mumble.