Input validation error in jabberd2 - CVE-2012-3525
Published: August 25, 2012 / Updated: August 11, 2020
jabberd2
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
s2s/out.c in jabberd2 2.2.16 and earlier does not verify that a request was made for an XMPP Server Dialback response, which allows remote XMPP servers to spoof domains via a (1) Verify Response or (2) Authorization Response.
How to mitigate CVE-2012-3525
Sources
- http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html
- http://rhn.redhat.com/errata/RHSA-2012-1538.html
- http://rhn.redhat.com/errata/RHSA-2012-1539.html
- http://secunia.com/advisories/50124
- http://secunia.com/advisories/50859
- http://www.mail-archive.com/jabberd2@lists.xiaoka.com/msg01903.html
- http://www.openwall.com/lists/oss-security/2012/08/22/5
- http://www.openwall.com/lists/oss-security/2012/08/22/6
- http://www.securityfocus.com/bid/55167
- http://xmpp.org/resources/security-notices/server-dialback/
- https://bugzilla.redhat.com/show_bug.cgi?id=850872
- https://github.com/Jabberd2/jabberd2/commit/aabcffae560d5fd00cd1d2ffce5d760353cf0a4d