|
Message-ID: <20120215220912.GR15310@redhat.com> Date: Wed, 15 Feb 2012 15:09:12 -0700 From: Vincent Danen <vdanen@...hat.com> To: oss-security@...ts.openwall.com Subject: CVE request: mumble local information disclosure It was discovered that mumble created its database file (~/.local/share/data/Mumble/.mumble.sqlite) with insecure world-readable permissions. If the user had (non-default) permissions on their home directory, another local user could obtain password and configuration settings from the database file. This has been corrected in upstream git and is reported as affecting 1.2.3 and earlier. Could a CVE be assigned to this flaw? References: https://bugs.launchpad.net/ubuntu/+source/mumble/+bug/783405 https://github.com/mumble-voip/mumble/commit/5632c35d6759f5e13a7dfe78e4ee6403ff6a8e3e https://bugzilla.redhat.com/show_bug.cgi?id=791000 http://bugs.gentoo.org/show_bug.cgi?id=403939 -- Vincent Danen / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.