Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2014-2743

Overview

Vulnerability Score 7.8 7.8
CVE Id CVE-2014-2743
Last Modified 11 Apr 2014 03:36:08
Published 10 Apr 2014 09:55:06
Confidentiality Impact NONE NONE
Integrity Impact NONE NONE
Availability Impact COMPLETE COMPLETE
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2014-2743

Summary

plugins/mod_compression.lua in Lightwitch Metronome through 3.4 does not properly restrict the processing of compressed XML elements, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XMPP stream, aka an "xmppbomb" attack.

Vulnerable Systems

Application

  • Lightwitch Metronome 3.4


References

MISC - http://xmpp.org/resources/security-notices/uncontrolled-resource-consumption-with-highly-compressed-xmpp-stanzas/

MLIST - [oss-security] 20140408 Re: (Openfire M-Link Metronome Prosody Tigase) Possible CVE Request: Uncontrolled Resource Consumption with XMPP-Layer Compression

MLIST - [oss-security] 20140407 Re: Possible CVE Request: Uncontrolled Resource Consumption with XMPP-Layer Compression

CONFIRM - http://code.lightwitch.org/metronome/rev/49f47277a411


Last Updated: 27 May 2016 11:04:54