First published: Thu May 13 2021(Updated: )
An issue was discovered in Prosody before 0.11.9. Default settings are susceptible to remote unauthenticated denial-of-service (DoS) attacks via memory exhaustion when running under Lua 5.2 or Lua 5.3.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/prosody | 0.11.2-1+deb10u4 0.11.9-2+deb11u2 0.12.3-1 0.12.4-1 | |
Prosody Prosody | <0.11.9 | |
Lua Lua | =5.2.0 | |
Lua Lua | =5.3.0 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-32918.
The severity of CVE-2021-32918 is high with a CVSS score of 7.5.
The affected software for CVE-2021-32918 is Prosody version 0.11.2-1+deb10u4, 0.11.9-2+deb11u2, 0.12.3-1, and 0.12.4-1 running under Lua 5.2 or Lua 5.3.
To fix CVE-2021-32918, update Prosody to version 0.11.9 or apply the available patches from the official Prosody website.
You can find more information about CVE-2021-32918 in the references provided: [link1], [link2], and [link3].