First published: Fri Apr 11 2014(Updated: )
plugins/mod_compression.lua in (1) Prosody before 0.9.4 and (2) Lightwitch Metronome through 3.4 negotiates stream compression while a session is unauthenticated, which allows remote attackers to cause a denial of service (resource consumption) via compressed XML elements in an XMPP stream, aka an "xmppbomb" attack.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Lightwitch Metronome | <=3.4 | |
Prosody | <=0.9.3 | |
Prosody | =0.1.0 | |
Prosody | =0.2.0 | |
Prosody | =0.3.0 | |
Prosody | =0.4.0 | |
Prosody | =0.4.1 | |
Prosody | =0.4.2 | |
Prosody | =0.5.0 | |
Prosody | =0.5.1 | |
Prosody | =0.5.2 | |
Prosody | =0.6.0 | |
Prosody | =0.6.1 | |
Prosody | =0.6.2 | |
Prosody | =0.7.0 | |
Prosody | =0.8.0 | |
Prosody | =0.8.1 | |
Prosody | =0.8.2 | |
Prosody | =0.9.0 | |
Prosody | =0.9.1 | |
Prosody | =0.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2744 has been classified as a denial of service vulnerability.
To mitigate CVE-2014-2744, upgrade to Prosody version 0.9.4 or later, or to Lightwitch Metronome version 3.5 or later.
CVE-2014-2744 is caused by stream compression negotiation during unauthenticated sessions, allowing attackers to exploit resource consumption.
CVE-2014-2744 affects Prosody versions before 0.9.4 and Lightwitch Metronome versions up to 3.4.
CVE-2014-2744 impacts XMPP based systems that utilize Prosody or Lightwitch Metronome for communication.