First published: Tue Sep 21 2004(Updated: )
The expat XML parser code, as used in the open source Jabber (jabberd) 1.4.3 and earlier, jadc2s 0.9.0 and earlier, and possibly other packages, allows remote attackers to cause a denial of service (application crash) via a malformed packet to a socket that accepts XML connections.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jabberd | =1.4 | |
Jabberd | =1.4.1 | |
Jabberd | =1.4.2 | |
Jabberd | =1.4.2a | |
Jabberd | =1.4.3 | |
Jabberstudio Jadc2s | =0.6 | |
Jabberstudio Jadc2s | =0.7 | |
Jabberstudio Jadc2s | =0.8 | |
Jabberstudio Jadc2s | =0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1378 is classified as a denial of service vulnerability that can cause application crashes.
To fix CVE-2004-1378, upgrade to a version of Jabberd or Jadc2s that is not affected, specifically versions later than 1.4.3 for Jabberd or 0.9 for Jadc2s.
The affected versions of Jabberd are 1.4.0 through 1.4.3.
The affected versions of Jadc2s are 0.6 through 0.9.
Yes, CVE-2004-1378 can be exploited remotely through a malformed XML packet.