First published: Thu Jan 12 2017(Updated: )
Race condition in the XMPP library in Smack before 4.1.9, when the SecurityMode.required TLS setting has been set, allows man-in-the-middle attackers to bypass TLS protections and trigger use of cleartext for client authentication by stripping the "starttls" feature from a server response.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ignite Realtime Smack | <4.1.9 | |
Fedora | =25 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10027 is classified as a medium severity vulnerability due to its potential to allow man-in-the-middle attacks.
To fix CVE-2016-10027, upgrade the Smack library to version 4.1.9 or later.
CVE-2016-10027 affects all Smack versions prior to 4.1.9.
CVE-2016-10027 allows man-in-the-middle attackers to bypass TLS protections.
Yes, Fedora 25 is affected by CVE-2016-10027 if it uses a vulnerable version of the Smack library.