First published: Thu May 13 2021(Updated: )
Prosody before 0.11.9 allows Uncontrolled CPU Consumption via a flood of SSL/TLS renegotiation requests.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/prosody | 0.11.2-1+deb10u4 0.11.9-2+deb11u2 0.12.3-1 0.12.4-1 | |
Prosody Prosody | <0.11.9 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-32920 is a vulnerability in Prosody before 0.11.9 that allows uncontrolled CPU consumption via a flood of SSL/TLS renegotiation requests.
CVE-2021-32920 has a severity rating of high, with a CVSS score of 7.5.
The affected software versions include Prosody 0.11.2-1+deb10u4, 0.11.9-2+deb11u2, 0.12.3-1, and 0.12.4-1.
To fix CVE-2021-32920, update Prosody to version 0.11.9 or later.
You can find more information about CVE-2021-32920 at the following references: [http://www.openwall.com/lists/oss-security/2021/05/13/1](http://www.openwall.com/lists/oss-security/2021/05/13/1), [http://www.openwall.com/lists/oss-security/2021/05/14/2](http://www.openwall.com/lists/oss-security/2021/05/14/2), [https://blog.prosody.im/prosody-0.11.9-released/](https://blog.prosody.im/prosody-0.11.9-released/)