SB2014041101 - Denial of service in Openfire
Published: April 11, 2014 Updated: October 12, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Input validation error (CVE-ID: CVE-2014-2741)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in nio/XMLLightweightParser.java when processing XML elements. A remote authenticated attacker can use a specially crafted XMPP stream to consume excessive server resources.
Remediation
Install update from vendor's website.
References
- http://www.kb.cert.org/vuls/id/495476
- http://xmpp.org/resources/security-notices/uncontrolled-resource-consumption-with-highly-compressed-xmpp-stanzas/
- http://openwall.com/lists/oss-security/2014/04/09/1
- http://openwall.com/lists/oss-security/2014/04/07/7
- http://fisheye.igniterealtime.org/changelog/openfiregit?cs=3aec383e07ee893b77396fe946766bbd3758af77
- http://community.igniterealtime.org/thread/52317