Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-2744

Опубликовано: 11 апр. 2014
Источник: debian
EPSS Низкий

Описание

plugins/mod_compression.lua in (1) Prosody before 0.9.4 and (2) Lightwitch Metronome through 3.4 negotiates stream compression while a session is unauthenticated, which allows remote attackers to cause a denial of service (resource consumption) via compressed XML elements in an XMPP stream, aka an "xmppbomb" attack.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
prosodyfixed0.9.4-1package
lua-expatfixed1.3.0-1package
lua-expatfixed1.2.0-5+deb7u1wheezypackage
lua-expatno-dsasqueezepackage
prosodyno-dsasqueezepackage

Примечания

  • http://hg.prosody.im/0.9/rev/b3b1c9da38fb

EPSS

Процентиль: 84%
0.02179
Низкий

Связанные уязвимости

ubuntu
почти 12 лет назад

plugins/mod_compression.lua in (1) Prosody before 0.9.4 and (2) Lightwitch Metronome through 3.4 negotiates stream compression while a session is unauthenticated, which allows remote attackers to cause a denial of service (resource consumption) via compressed XML elements in an XMPP stream, aka an "xmppbomb" attack.

nvd
почти 12 лет назад

plugins/mod_compression.lua in (1) Prosody before 0.9.4 and (2) Lightwitch Metronome through 3.4 negotiates stream compression while a session is unauthenticated, which allows remote attackers to cause a denial of service (resource consumption) via compressed XML elements in an XMPP stream, aka an "xmppbomb" attack.

github
больше 3 лет назад

plugins/mod_compression.lua in (1) Prosody before 0.9.4 and (2) Lightwitch Metronome through 3.4 negotiates stream compression while a session is unauthenticated, which allows remote attackers to cause a denial of service (resource consumption) via compressed XML elements in an XMPP stream, aka an "xmppbomb" attack.

EPSS

Процентиль: 84%
0.02179
Низкий