SB2017011346 - Race condition in Smack
Published: January 13, 2017 Updated: August 14, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Race condition (CVE-ID: CVE-2016-10027)
The vulnerability allows a remote attacker to escalate privileges on the system.
The vulnerability exists due to a race condition in the XMPP library in Smack, when the SecurityMode.required TLS setting has been set. A remote attacker can exploit the race to bypass TLS protections and trigger use of cleartext for client authentication by stripping the "starttls" feature from a server response.
Remediation
Install update from vendor's website.
References
- http://www.openwall.com/lists/oss-security/2016/12/22/12
- http://www.securityfocus.com/bid/95129
- https://community.igniterealtime.org/blogs/ignite/2016/11/22/smack-security-advisory-2016-11-22
- https://github.com/igniterealtime/Smack/commit/059ee99ba0d5ff7758829acf5a9aeede09ec820b
- https://github.com/igniterealtime/Smack/commit/a9d5cd4a611f47123f9561bc5a81a4555fe7cb04
- https://issues.igniterealtime.org/projects/SMACK/issues/SMACK-739
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J4WXAZ4JVJXHMEDDXJVWJHPVBF5QCTZF/