SB2016010812 - Fedora EPEL 5 update for prosody



SB2016010812 - Fedora EPEL 5 update for prosody

Published: January 8, 2016 Updated: April 24, 2025

Security Bulletin ID SB2016010812
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Information disclosure

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Path traversal (CVE-ID: CVE-2016-1231)

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences in the HTTP file-serving module (mod_http_files) in Prosody 0.9.x before 0.9.9. A remote authenticated attacker can send a specially crafted HTTP request and remote attackers to read arbitrary files via a . (dot dot) in an unspecified path.


2) Input validation error (CVE-ID: CVE-2016-1232)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The mod_dialback module in Prosody before 0.9.9 does not properly generate random values for the secret token for server-to-server dialback authentication, which makes it easier for attackers to spoof servers via a brute force attack. <a href="https://cwe.mitre.org/data/definitions/338.html">CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)</a>


Remediation

Install update from vendor's website.