CVE-2013-1431

N/A Unknown
Published: September 23, 2013 Modified: April 29, 2026
View on NVD

Description

The Wocky module in Telepathy Gabble before 0.16.6 and 0.17.x before 0.17.4, when connecting to a "legacy Jabber server," does not properly enforce the WockyConnector:tls-required flag, which allows remote attackers to bypass TLS verification and perform a man-in-the-middle attacks.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://seclists.org/oss-sec/2013/q2/438
Source: security@debian.org
Mailing List Patch
http://secunia.com/advisories/53779
Source: security@debian.org
Permissions Required Third Party Advisory
http://www.debian.org/security/2013/dsa-2702
Source: security@debian.org
Third Party Advisory
http://www.ubuntu.com/usn/USN-1873-1
Source: security@debian.org
Third Party Advisory
http://seclists.org/oss-sec/2013/q2/438
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch
http://secunia.com/advisories/53779
Source: af854a3a-2127-422b-91ae-364da2661108
Permissions Required Third Party Advisory
http://www.debian.org/security/2013/dsa-2702
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.ubuntu.com/usn/USN-1873-1
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://bugs.freedesktop.org/show_bug.cgi?id=65036
Source: af854a3a-2127-422b-91ae-364da2661108
Patch

10 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.4%
63th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

simon_mcvittie