Vulnerabilities > CVE-2012-0863 - Cryptographic Issues vulnerability in Mumble

047910
CVSS 2.1 - LOW
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
local
low complexity
mumble
CWE-310
nessus

Summary

Mumble 1.2.3 and earlier uses world-readable permissions for .local/share/data/Mumble/.mumble.sqlite files in home directories, which might allow local users to obtain a cleartext password and configuration data by reading a file.

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.

Nessus

  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2012-8903.NASL
    descriptionThis update fixes a number of startup problems of the mumble server murmur. Additionally it contains a fix for CVE-2012-0863 (insecure world-readable permissions on database file) of the mumble client. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2012-06-20
    plugin id59574
    published2012-06-20
    reporterThis script is Copyright (C) 2012-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/59574
    titleFedora 17 : mumble-1.2.3-7.fc17.1 (2012-8903)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2012-8956.NASL
    descriptionThis update fixes a number of startup problems of the mumble server murmur. Additionally it contains a fix for CVE-2012-0863 (insecure world-readable permissions on database file) of the mumble client. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2012-06-20
    plugin id59575
    published2012-06-20
    reporterThis script is Copyright (C) 2012-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/59575
    titleFedora 16 : mumble-1.2.3-5.fc16.1 (2012-8956)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2012-127.NASL
    description - remove read permissions for other users on local sqlite database as it may contain passwords (bnc#747833, CVE-2012-0863) - don
    last seen2020-06-05
    modified2014-06-13
    plugin id74552
    published2014-06-13
    reporterThis script is Copyright (C) 2014-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/74552
    titleopenSUSE Security Update : mumble (openSUSE-2012-127)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-2411.NASL
    descriptionIt was discovered that Mumble, a VoIP client, does not properly manage permissions on its user-specific configuration files, allowing other local users on the system to access them.
    last seen2020-03-17
    modified2012-02-20
    plugin id58011
    published2012-02-20
    reporterThis script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/58011
    titleDebian DSA-2411-1 : mumble - information disclosure
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2012-8960.NASL
    descriptionThis update fixes a number of startup problems of the mumble server murmur. Additionally it contains a fix for CVE-2012-0863 (insecure world-readable permissions on database file) of the mumble client. Rebuild for newer protobuf Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2012-06-20
    plugin id59576
    published2012-06-20
    reporterThis script is Copyright (C) 2012-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/59576
    titleFedora 15 : mumble-1.2.3-4.fc15.1 (2012-8960)