[Forgot Password]
Login  Register Subscribe

25354

 
 

132804

 
 

134729

 
 

909

 
 

109403

 
 

153

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2014-2744Date: (C)2014-04-11   (M)2019-06-12


plugins/mod_compression.lua in (1) Prosody before 0.9.4 and (2) Lightwitch Metronome through 3.4 negotiates stream compression while a session is unauthenticated, which allows remote attackers to cause a denial of service (resource consumption) via compressed XML elements in an XMPP stream, aka an "xmppbomb" attack.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 7.8
Exploit Score: 10.0
Impact Score: 6.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: NONE
Integrity: NONE
Availability: COMPLETE
  
Reference:
SECUNIA-57710
DSA-2895
http://openwall.com/lists/oss-security/2014/04/07/7
http://openwall.com/lists/oss-security/2014/04/09/1
http://blog.prosody.im/prosody-0-9-4-released/
http://code.lightwitch.org/metronome/rev/49f47277a411
http://hg.prosody.im/0.9/rev/b3b1c9da38fb
http://xmpp.org/resources/security-notices/uncontrolled-resource-consumption-with-highly-compressed-xmpp-stanzas/

CPE    21
cpe:/a:lightwitch:metronome:3.4
cpe:/a:prosody:prosody:0.1.0
cpe:/a:prosody:prosody:0.6.2
cpe:/a:prosody:prosody:0.8.0
...
CWE    1
CWE-20
OVAL    2
oval:org.secpod.oval:def:601267
oval:org.secpod.oval:def:106926

© SecPod Technologies