CVE-2015-2058

Source
https://nvd.nist.gov/vuln/detail/CVE-2015-2058
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2015-2058.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2015-2058
Downstream
Published
2015-08-12T14:59:08Z
Modified
2025-08-09T20:01:25Z
Summary
[none]
Details

c2s/c2s.c in Jabber Open Source Server 2.3.2 and earlier truncates data without ensuring it remains valid UTF-8, which allows remote authenticated users to read system memory or possibly have other unspecified impact via a crafted JID.

References

Affected packages