Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20120215220912.GR15310@redhat.com>
Date: Wed, 15 Feb 2012 15:09:12 -0700
From: Vincent Danen <vdanen@...hat.com>
To: oss-security@...ts.openwall.com
Subject: CVE request: mumble local information disclosure

It was discovered that mumble created its database file
(~/.local/share/data/Mumble/.mumble.sqlite) with insecure world-readable
permissions.  If the user had (non-default) permissions on their home
directory, another local user could obtain password and configuration
settings from the database file.

This has been corrected in upstream git and is reported as affecting
1.2.3 and earlier.

Could a CVE be assigned to this flaw?

References:

https://bugs.launchpad.net/ubuntu/+source/mumble/+bug/783405
https://github.com/mumble-voip/mumble/commit/5632c35d6759f5e13a7dfe78e4ee6403ff6a8e3e
https://bugzilla.redhat.com/show_bug.cgi?id=791000
http://bugs.gentoo.org/show_bug.cgi?id=403939

-- 
Vincent Danen / Red Hat Security Response Team 

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.