#VU21741 Input validation error in Openfire - CVE-2014-2741
Published: October 12, 2019
Openfire
Ignite Realtime
Description
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in nio/XMLLightweightParser.java when processing XML elements. A remote authenticated attacker can use a specially crafted XMPP stream to consume excessive server resources.
Remediation
External links
- http://www.kb.cert.org/vuls/id/495476
- http://xmpp.org/resources/security-notices/uncontrolled-resource-consumption-with-highly-compressed-xmpp-stanzas/
- http://openwall.com/lists/oss-security/2014/04/09/1
- http://openwall.com/lists/oss-security/2014/04/07/7
- http://fisheye.igniterealtime.org/changelog/openfiregit?cs=3aec383e07ee893b77396fe946766bbd3758af77
- http://community.igniterealtime.org/thread/52317