SB2014042315 - Fedora EPEL 6 update for prosody



SB2014042315 - Fedora EPEL 6 update for prosody

Published: April 23, 2014 Updated: April 24, 2025

Security Bulletin ID SB2014042315
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2014-2745)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

Prosody before 0.9.4 does not properly restrict the processing of compressed XML elements, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XMPP stream, aka an "xmppbomb" attack, related to core/portmanager.lua and util/xmppstream.lua.


2) Input validation error (CVE-ID: CVE-2014-2744)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

plugins/mod_compression.lua in (1) Prosody before 0.9.4 and (2) Lightwitch Metronome through 3.4 negotiates stream compression while a session is unauthenticated, which allows remote attackers to cause a denial of service (resource consumption) via compressed XML elements in an XMPP stream, aka an "xmppbomb" attack.


Remediation

Install update from vendor's website.