Show plain JSON{"id": "CVE-2013-1769", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2014-01-21T18:55:09.350", "references": [{"url": "http://lists.freedesktop.org/archives/telepathy/2013-March/006377.html", "tags": ["Patch"], "source": "secalert@redhat.com"}, {"url": "http://lists.freedesktop.org/archives/telepathy/2013-March/006378.html", "tags": ["Patch"], "source": "secalert@redhat.com"}, {"url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00085.html", "tags": ["Patch"], "source": "secalert@redhat.com"}, {"url": "http://secunia.com/advisories/53779", "tags": ["Vendor Advisory"], "source": "secalert@redhat.com"}, {"url": "http://www.ubuntu.com/usn/USN-1873-1", "source": "secalert@redhat.com"}, {"url": "http://lists.freedesktop.org/archives/telepathy/2013-March/006377.html", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.freedesktop.org/archives/telepathy/2013-March/006378.html", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00085.html", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/53779", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.ubuntu.com/usn/USN-1873-1", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-310"}]}], "descriptions": [{"lang": "en", "value": "A certain hashing algorithm in Telepathy Gabble 0.16.x before 0.16.5 and 0.17.x before 0.17.3 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted message."}, {"lang": "es", "value": "Un algoritmo de hash concreto en Telepathy Gabble 0.16.x anterior a la versi\u00f3n 0.16.5 y 0.17.x anterior a 0.17.3 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (dereferencia a puntero nulo y ca\u00edda) a trav\u00e9s de un mensaje manipulado."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:simon_mcvittie:telepathy_gabble:0.16.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D711C5BB-A652-4639-A6F3-6894968E025F"}, {"criteria": "cpe:2.3:a:simon_mcvittie:telepathy_gabble:0.16.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D7785107-E4E7-4A50-B3EE-32764D81C245"}, {"criteria": "cpe:2.3:a:simon_mcvittie:telepathy_gabble:0.16.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "57A42D6E-D526-4ECC-9FA5-6C7AD41EBB86"}, {"criteria": "cpe:2.3:a:simon_mcvittie:telepathy_gabble:0.16.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6C909292-5E84-4C03-B813-46C006DEB70B"}, {"criteria": "cpe:2.3:a:simon_mcvittie:telepathy_gabble:0.16.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "81BCD4A1-4416-44EB-A11D-BA1D87D12DD3"}, {"criteria": "cpe:2.3:a:simon_mcvittie:telepathy_gabble:0.17.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9DD30B7F-79A0-4250-A606-8F8BA4522A83"}, {"criteria": "cpe:2.3:a:simon_mcvittie:telepathy_gabble:0.17.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF035AD1-4103-4754-878F-93A35D1EACB9"}, {"criteria": "cpe:2.3:a:simon_mcvittie:telepathy_gabble:0.17.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FE407EDE-295A-4DEE-9BCA-BAA038BF7BF8"}], "operator": "OR"}]}], "sourceIdentifier": "secalert@redhat.com"}