First published: Wed Aug 12 2015(Updated: )
c2s/c2s.c in Jabber Open Source Server 2.3.2 and earlier truncates data without ensuring it remains valid UTF-8, which allows remote authenticated users to read system memory or possibly have other unspecified impact via a crafted JID.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
jabberd2 | <=2.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-2058 has a severity rating of moderate due to potential unauthorized access to system memory.
To fix CVE-2015-2058, upgrade to Jabber Open Source Server version 2.3.3 or later.
CVE-2015-2058 affects users of Jabber Open Source Server version 2.3.2 and earlier.
CVE-2015-2058 represents a data truncation vulnerability that may lead to memory exposure.
Remote authenticated users can exploit CVE-2015-2058 by sending a crafted JID that truncates data incorrectly.