First published: Tue Jan 12 2016(Updated: )
The mod_dialback module in Prosody before 0.9.9 does not properly generate random values for the secret token for server-to-server dialback authentication, which makes it easier for attackers to spoof servers via a brute force attack.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Prosody Prosody | <=0.9.8 | |
Prosody Prosody | =0.9.0 | |
Prosody Prosody | =0.9.1 | |
Prosody Prosody | =0.9.2 | |
Prosody Prosody | =0.9.3 | |
Prosody Prosody | =0.9.4 | |
Prosody Prosody | =0.9.5 | |
Prosody Prosody | =0.9.6 | |
Prosody Prosody | =0.9.7 | |
Fedoraproject Fedora | =22 | |
Fedoraproject Fedora | =23 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.