CVE-2014-3756CVE-2014-3756

Affected configuration(s):

cpe:/a:mumble:mumble:1.2.0
cpe:/a:mumble:mumble:1.2.1
cpe:/a:mumble:mumble:1.2.2
cpe:/a:mumble:mumble:1.2.3
cpe:/a:mumble:mumble:1.2.3:rc1
cpe:/a:mumble:mumble:1.2.3:rc2
cpe:/a:mumble:mumble:1.2.3:rc3
cpe:/a:mumble:mumble:1.2.4
cpe:/a:mumble:mumble:1.2.4:beta1
cpe:/a:mumble:mumble:1.2.4:rc1
cpe:/a:mumble:mumble:1.2.5

Date published: 2014-11-16T06:59:03.887-05:00

Date last modified: 2014-11-17T12:36:31.193-05:00

CVSS Score: 5.0

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL: http://mumble.info/security/Mumble-SA-2014-006.txt

Summary: The client in Mumble 1.2.x before 1.2.6 allows remote attackers to force the loading of an external file and cause a denial of service (hang and resource consumption) via a crafted string that is treated as rich-text by a Qt widget, as demonstrated by the (1) user or (2) channel name in a Qt dialog, (3) subject common name or (4) email address to the Certificate Wizard, or (5) server name in a tooltip.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.