First published: Tue Jan 12 2016(Updated: )
The mod_dialback module in Prosody before 0.9.9 does not properly generate random values for the secret token for server-to-server dialback authentication, which makes it easier for attackers to spoof servers via a brute force attack.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Prosody Prosody | <=0.9.8 | |
Prosody Prosody | =0.9.0 | |
Prosody Prosody | =0.9.1 | |
Prosody Prosody | =0.9.2 | |
Prosody Prosody | =0.9.3 | |
Prosody Prosody | =0.9.4 | |
Prosody Prosody | =0.9.5 | |
Prosody Prosody | =0.9.6 | |
Prosody Prosody | =0.9.7 | |
Fedoraproject Fedora | =22 | |
Fedoraproject Fedora | =23 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1232 has a moderate severity rating due to its potential to allow brute force attacks that can spoof servers.
To fix CVE-2016-1232, upgrade Prosody to version 0.9.9 or later, as this version addresses the vulnerability.
CVE-2016-1232 affects Prosody versions 0.9.0 to 0.9.8.
The mod_dialback module in Prosody is specifically impacted by CVE-2016-1232.
Yes, CVE-2016-1232 can facilitate unauthorized server communications by enabling attackers to spoof server identities.