Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1qNXFoLWNwM3AtMmg4N84AAek4
Ignite Realtime Openfire vulnerable to XMPPbomb attack
nio/XMLLightweightParser.java in Ignite Realtime Openfire before 3.9.2 does not properly restrict the processing of compressed XML elements, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XMPP stream, aka an "xmppbomb" attack.
Permalink: https://github.com/advisories/GHSA-j5qh-cp3p-2h87JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1qNXFoLWNwM3AtMmg4N84AAek4
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: almost 2 years ago
Updated: 9 months ago
Identifiers: GHSA-j5qh-cp3p-2h87, CVE-2014-2741
References:
- https://nvd.nist.gov/vuln/detail/CVE-2014-2741
- http://community.igniterealtime.org/thread/52317
- http://openwall.com/lists/oss-security/2014/04/07/7
- http://openwall.com/lists/oss-security/2014/04/09/1
- http://www.kb.cert.org/vuls/id/495476
- https://github.com/igniterealtime/Openfire/commit/3aec383e07ee893b77396fe946766bbd3758af77
- https://web.archive.org/web/20140407092132/http://xmpp.org/resources/security-notices/uncontrolled-resource-consumption-with-highly-compressed-xmpp-stanzas
- https://web.archive.org/web/20140705161237/http://fisheye.igniterealtime.org/changelog/openfiregit?cs=3aec383e07ee893b77396fe946766bbd3758af77
- https://github.com/advisories/GHSA-j5qh-cp3p-2h87
Blast Radius: 0.0
Affected Packages
maven:org.igniterealtime.openfire:parent
Dependent packages: 0Dependent repositories: 2
Downloads:
Affected Version Ranges: < 3.9.2
Fixed in: 3.9.2
All affected versions:
All unaffected versions: 4.2.0