| |
Vulnerability CVE-2014-2829
Published: 2014-04-10 Modified: 2014-04-11
Description: |
Erlang Solutions MongooseIM through 1.3.1 rev. 2 does not properly restrict the processing of compressed XML elements, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XMPP stream, aka an "xmppbomb" attack. |
Type:
CWE-264 (Permissions, Privileges, and Access Controls)
CVSS2 => (AV:N/AC:L/Au:N/C:N/I:N/A:C)
CVSS Base Score |
Impact Subscore |
Exploitability Subscore |
7.8/10 |
6.9/10 |
10/10 |
Exploit range |
Attack complexity |
Authentication |
Remote |
Low |
No required |
Confidentiality impact |
Integrity impact |
Availability impact |
None |
None |
Complete |
References: |
https://github.com/esl/MongooseIM/commit/586d96cc12ef218243a3466354b4d208b5472a6c
http://xmpp.org/resources/security-notices/uncontrolled-resource-consumption-with-highly-compressed-xmpp-stanzas/
|
|
|
closedb();
?>
Copyright 2024, cxsecurity.com
|
|
|