Vulnerability CVE-2014-2744


Published: 2014-04-10   Modified: 2014-04-11

Description:
plugins/mod_compression.lua in (1) Prosody before 0.9.4 and (2) Lightwitch Metronome through 3.4 negotiates stream compression while a session is unauthenticated, which allows remote attackers to cause a denial of service (resource consumption) via compressed XML elements in an XMPP stream, aka an "xmppbomb" attack.

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:N/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.8/10
6.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Complete
Affected software
Prosody -> Prosody 
Lightwitch -> Metronome 

 References:
http://hg.prosody.im/0.9/rev/b3b1c9da38fb
http://code.lightwitch.org/metronome/rev/49f47277a411
http://xmpp.org/resources/security-notices/uncontrolled-resource-consumption-with-highly-compressed-xmpp-stanzas/
http://www.debian.org/security/2014/dsa-2895
http://openwall.com/lists/oss-security/2014/04/09/1
http://openwall.com/lists/oss-security/2014/04/07/7
http://blog.prosody.im/prosody-0-9-4-released/

Copyright 2024, cxsecurity.com

 

Back to Top