
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-3433 affects the nickname field within Savoir-faire Linux's Jami application. The vulnerability was discovered and disclosed in July 2023, impacting the Jami client application. The issue occurs when users insert special characters into the nickname field, causing the application to enter a failed state (NVD).
The vulnerability is characterized by improper input validation (CWE-20) in the nickname field of the Jami application. When special characters are inserted into this field, the application becomes unable to create the user signature. The vulnerability has been assigned a CVSS v3.1 base score of 5.5 (Medium) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating local access requirements and high availability impact (NVD).
The primary impact of this vulnerability is a local denial of service to the Jami application. When exploited, the application cannot create the signature for the user, effectively preventing normal application functionality (NVD).
A patch has been released to address this vulnerability, available through the Jami update system. The fix was implemented in the Jami daemon and can be found in the nightly release from January 10 (Jami Changelog, Jami Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."