First published: Wed Feb 15 2012(Updated: )
It was discovered that mumble created its database file (~/.local/share/data/Mumble/.mumble.sqlite) with insecure world-readable permissions. If the user had (non-default) permissions on their home directory, another local user could obtain password and configuration settings from the database file [1]. This has been corrected in upstream git [2] and is reported as affecting 1.2.3 and earlier. [1] <a href="https://bugs.launchpad.net/ubuntu/+source/mumble/+bug/783405">https://bugs.launchpad.net/ubuntu/+source/mumble/+bug/783405</a> [2] <a href="https://github.com/mumble-voip/mumble/commit/5632c35d6759f5e13a7dfe78e4ee6403ff6a8e3e">https://github.com/mumble-voip/mumble/commit/5632c35d6759f5e13a7dfe78e4ee6403ff6a8e3e</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mumble Mumble | <=1.2.3 | |
Mumble Mumble | =1.2.0 | |
Mumble Mumble | =1.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.