First published: Sun Nov 16 2014(Updated: )
The client in Mumble 1.2.x before 1.2.6 allows remote attackers to force the loading of an external file and cause a denial of service (hang and resource consumption) via a crafted string that is treated as rich-text by a Qt widget, as demonstrated by the (1) user or (2) channel name in a Qt dialog, (3) subject common name or (4) email address to the Certificate Wizard, or (5) server name in a tooltip.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mumble Mumble | =1.2.0 | |
Mumble Mumble | =1.2.1 | |
Mumble Mumble | =1.2.2 | |
Mumble Mumble | =1.2.3 | |
Mumble Mumble | =1.2.3-rc1 | |
Mumble Mumble | =1.2.3-rc2 | |
Mumble Mumble | =1.2.3-rc3 | |
Mumble Mumble | =1.2.4 | |
Mumble Mumble | =1.2.4-beta1 | |
Mumble Mumble | =1.2.4-rc1 | |
Mumble Mumble | =1.2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.