Upstream information

CVE-2014-3756 at MITRE

Description

The client in Mumble 1.2.x before 1.2.6 allows remote attackers to force the loading of an external file and cause a denial of service (hang and resource consumption) via a crafted string that is treated as rich-text by a Qt widget, as demonstrated by the (1) user or (2) channel name in a Qt dialog, (3) subject common name or (4) email address to the Certificate Wizard, or (5) server name in a tooltip.

SUSE information

Overall state of this security issue: Does not affect SUSE products

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 5
Vector AV:N/AC:L/Au:N/C:N/I:N/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
SUSE Bugzilla entry: 877971 [RESOLVED / FIXED]

SUSE Security Advisories:

    openSUSE-SU-2014:0706-1

List of released packages

Product(s) Fixed package version(s) References
openSUSE Tumbleweed
  • mumble >= 1.2.17-1.2
  • mumble-32bit >= 1.2.17-1.2
  • mumble-server >= 1.2.17-1.2
Patchnames:
openSUSE-Tumbleweed-2024-10080


SUSE Timeline for this CVE

CVE page created: Thu May 15 06:22:38 2014
CVE page last modified: Sat Jun 15 22:16:35 2024