2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2011-1000" ,
"sourceIdentifier" : "secalert@redhat.com" ,
"published" : "2011-02-19T01:00:03.587" ,
2024-11-22 11:14:00 +00:00
"lastModified" : "2024-11-21T01:25:17.980" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "jingle-factory.c in Telepathy Gabble 0.11 before 0.11.7, 0.10 before 0.10.5, and 0.8 before 0.8.15 allows remote attackers to sniff audio and video calls via a crafted google:jingleinfo stanza that specifies an alternate server for streamed media."
} ,
{
"lang" : "es" ,
"value" : "jingle-factory.c en Telepathy Gabble v0.11 antes de v0.11.7, v0.10 antes de v0.10.5, y v0.8 antes de v0.8.15 permite a atacantes remotos rastrear llamadas de audio y v\u00eddeo a trav\u00e9s de una estrofa google:jingleinfo debidamente modificada donde se especifica un servidor alternativo para el contenido multimedia enviado por streaming."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:N" ,
2024-11-22 11:14:00 +00:00
"baseScore" : 6.4 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
2024-11-22 11:14:00 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 4.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-20"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:freedesktop:telepathy_gabble:0.11:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D7B08E26-8AC8-42B0-87D2-500EE4E6B5F9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:freedesktop:telepathy_gabble:0.11.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "40AB1AF4-D061-41E4-AA15-8BC05AAD3D81"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:freedesktop:telepathy_gabble:0.11.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DCDF2FEF-6CF6-447B-9FE2-E4744AB719AC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:freedesktop:telepathy_gabble:0.11.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "06C3DF89-B7A9-4FBD-9E26-957836A08658"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:freedesktop:telepathy_gabble:0.11.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E40D638F-EF85-4F15-A937-99F27A3FDE84"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:freedesktop:telepathy_gabble:0.11.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EB7DED28-C74B-4EE1-AABA-C5D4B22B3942"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:freedesktop:telepathy_gabble:0.11.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "03ED1C24-624F-4702-A7D8-33F83266A79D"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:freedesktop:telepathy_gabble:0.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DDCC01ED-13F2-4912-A081-868BD9DA2A89"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:freedesktop:telepathy_gabble:0.10.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E28C647D-E3C4-4BD5-A781-4169650A1F5F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:freedesktop:telepathy_gabble:0.10.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "22DC153A-79F9-4CFD-A54D-AE2CA76D27B2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:freedesktop:telepathy_gabble:0.10.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "26CDDAD6-08EB-4008-BECD-5D3658AC8FE9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:freedesktop:telepathy_gabble:0.10.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A4AD9662-762E-484C-A940-40932F973FC8"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:freedesktop:telepathy_gabble:0.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5C60B5C9-EE58-42F4-AC18-10799F030FC9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:freedesktop:telepathy_gabble:0.8.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F4A60D96-D876-4436-B475-F0B0C27C5B6A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:freedesktop:telepathy_gabble:0.8.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3164EE83-2DD5-434E-9B5B-671C0533BCC3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:freedesktop:telepathy_gabble:0.8.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0718A377-6599-4DF2-A293-EC4F1E9FEC07"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:freedesktop:telepathy_gabble:0.8.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4ED95BED-B0CA-41FF-B519-F63560E2E1F9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:freedesktop:telepathy_gabble:0.8.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BE426DD3-173C-44CA-B7C6-8E59A73B4C8A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:freedesktop:telepathy_gabble:0.8.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "17A50E11-9991-46B9-AEAB-33EE84F8C0B0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:freedesktop:telepathy_gabble:0.8.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7FB1AF33-EBDC-4647-9147-33BA2CA6B72A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:freedesktop:telepathy_gabble:0.8.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AAABBF31-045A-4AE5-8DB1-F3E61BEB5279"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:freedesktop:telepathy_gabble:0.8.9:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2A4385F3-AA33-499C-9214-985A1DEC82C8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:freedesktop:telepathy_gabble:0.8.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "70C27E85-BB89-4311-9809-FA80BD71B999"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:freedesktop:telepathy_gabble:0.8.11:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6E47A169-0575-49A4-8CA6-972D89C7300E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:freedesktop:telepathy_gabble:0.8.12:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CD4E314B-AB04-4CC2-B568-87936F8F5383"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:freedesktop:telepathy_gabble:0.8.13:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CC06F2FD-C6CC-4D29-8C5F-B3C71978F89F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:freedesktop:telepathy_gabble:0.8.14:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "20994740-D2E4-417A-8992-76582FB79917"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054324.html" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054409.html" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054575.html" ,
"source" : "secalert@redhat.com"
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/43316" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/43369" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/43404" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/43485" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://secunia.com/advisories/43545" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://secunia.com/advisories/44023" ,
"source" : "secalert@redhat.com"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.debian.org/security/2011/dsa-2169" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2011/02/17/4" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2011/02/17/7" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/46440" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://www.ubuntu.com/usn/USN-1067-1" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://www.vupen.com/english/advisories/2011/0412" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2011/0428" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2011/0537" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://www.vupen.com/english/advisories/2011/0572" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://www.vupen.com/english/advisories/2011/0901" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "https://bugs.freedesktop.org/show_bug.cgi?id=34048" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/65523" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "https://hermes.opensuse.org/messages/7848248" ,
"source" : "secalert@redhat.com"
2024-11-22 11:14:00 +00:00
} ,
{
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054324.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054409.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054575.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/43316" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/43369" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/43404" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/43485" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/43545" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/44023" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.debian.org/security/2011/dsa-2169" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2011/02/17/4" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2011/02/17/7" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/46440" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.ubuntu.com/usn/USN-1067-1" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.vupen.com/english/advisories/2011/0412" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2011/0428" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2011/0537" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.vupen.com/english/advisories/2011/0572" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.vupen.com/english/advisories/2011/0901" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://bugs.freedesktop.org/show_bug.cgi?id=34048" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/65523" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://hermes.opensuse.org/messages/7848248" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}