[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2016-1232Date: (C)2016-02-11   (M)2023-12-22


The mod_dialback module in Prosody before 0.9.9 does not properly generate random values for the secret token for server-to-server dialback authentication, which makes it easier for attackers to spoof servers via a brute force attack.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 7.5CVSS Score : 5.0
Exploit Score: 3.9Exploit Score: 10.0
Impact Score: 3.6Impact Score: 2.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: LOWAccess Complexity: LOW
Privileges Required: NONEAuthentication: NONE
User Interaction: NONEConfidentiality: PARTIAL
Scope: UNCHANGEDIntegrity: NONE
Confidentiality: HIGHAvailability: NONE
Integrity: NONE 
Availability: NONE 
  
Reference:
DSA-3439
FEDORA-2016-38e48069f8
FEDORA-2016-e289f41b76
[oss-security]
http://www.openwall.com/lists/oss-security/2016/01/08/5
http://blog.prosody.im/prosody-0-9-9-security-release/
https://prosody.im/issues/issue/571
https://prosody.im/security/advisory_20160108-2/

CPE    13
cpe:/o:fedoraproject:fedora:22
cpe:/a:prosody:prosody:0.9.0
cpe:/a:prosody:prosody
cpe:/o:debian:debian_linux:7.0
...
OVAL    3
oval:org.secpod.oval:def:602329
oval:org.secpod.oval:def:110064
oval:org.secpod.oval:def:110063

© SecPod Technologies