First published: Fri Apr 11 2014(Updated: )
Prosody before 0.9.4 does not properly restrict the processing of compressed XML elements, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XMPP stream, aka an "xmppbomb" attack, related to core/portmanager.lua and util/xmppstream.lua.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Prosody | <=0.9.3 | |
Prosody | =0.1.0 | |
Prosody | =0.2.0 | |
Prosody | =0.3.0 | |
Prosody | =0.4.0 | |
Prosody | =0.4.1 | |
Prosody | =0.4.2 | |
Prosody | =0.5.0 | |
Prosody | =0.5.1 | |
Prosody | =0.5.2 | |
Prosody | =0.6.0 | |
Prosody | =0.6.1 | |
Prosody | =0.6.2 | |
Prosody | =0.7.0 | |
Prosody | =0.8.0 | |
Prosody | =0.8.1 | |
Prosody | =0.8.2 | |
Prosody | =0.9.0 | |
Prosody | =0.9.1 | |
Prosody | =0.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2745 has a severity level of high due to its potential for causing denial of service.
To fix CVE-2014-2745, upgrade Prosody to version 0.9.4 or later.
CVE-2014-2745 affects all Prosody versions before 0.9.4, including 0.9.3 and earlier.
CVE-2014-2745 is associated with a denial of service attack characterized as an 'xmppbomb' attack.
Yes, CVE-2014-2745 can be exploited by remote attackers through crafted XMPP streams.