First published: Fri Jan 29 2016(Updated: )
The generate_dialback function in the mod_dialback module in Prosody before 0.9.10 does not properly separate fields when generating dialback keys, which allows remote attackers to spoof XMPP network domains via a crafted stream id and domain name that is included in the target domain as a suffix.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Prosody Prosody | <=0.9.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-0756 is considered a high severity vulnerability due to its potential to allow remote attackers to spoof XMPP network domains.
To remediate CVE-2016-0756, you should upgrade Prosody to version 0.9.10 or later.
CVE-2016-0756 affects Prosody versions prior to 0.9.10.
CVE-2016-0756 allows attackers to exploit improper separation of fields in the generate_dialback function, enabling domain spoofing.
Exploitation of CVE-2016-0756 can lead to unauthorized access and potential manipulation of XMPP messages across the network.