{"id":"CVE-2016-9928","details":"MCabber before 1.0.4 is vulnerable to roster push attacks, which allows remote attackers to intercept communications, or add themselves as an entity on a 3rd party's roster as another user, which will also garner associated privileges, via crafted XMPP packets.","modified":"2026-03-12T22:26:05.714409Z","published":"2020-02-06T14:15:10.957Z","related":["MGASA-2016-0433","openSUSE-SU-2024:10979-1"],"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-updates/2017-01/msg00130.html"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2017/02/09/29"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/94862"},{"type":"ADVISORY","url":"https://gultsch.de/gajim_roster_push_and_message_interception.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/06/msg00031.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4506-1/"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/12/11/2"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1403790"},{"type":"FIX","url":"https://bitbucket.org/McKael/mcabber-crew/commits/6e1ead98930d7dd0a520ad17c720ae4908429033/raw"},{"type":"EVIDENCE","url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845258"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-9928.json","unresolved_ranges":[{"events":[{"introduced":"1.0.0"},{"fixed":"1.0.4"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"}]}