Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-0756

Опубликовано: 29 янв. 2016
Источник: debian
EPSS Низкий

Описание

The generate_dialback function in the mod_dialback module in Prosody before 0.9.10 does not properly separate fields when generating dialback keys, which allows remote attackers to spoof XMPP network domains via a crafted stream id and domain name that is included in the target domain as a suffix.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
prosodyfixed0.9.10-1package

Примечания

  • http://blog.prosody.im/prosody-0-9-10-released/

  • https://prosody.im/security/advisory_20160127/

  • Upstream fix https://github.com/bjc/prosody/commit/8708def4f55e61acdd5b2c762d420ab40da0d015

EPSS

Процентиль: 71%
0.00681
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
около 10 лет назад

The generate_dialback function in the mod_dialback module in Prosody before 0.9.10 does not properly separate fields when generating dialback keys, which allows remote attackers to spoof XMPP network domains via a crafted stream id and domain name that is included in the target domain as a suffix.

CVSS3: 5.3
nvd
около 10 лет назад

The generate_dialback function in the mod_dialback module in Prosody before 0.9.10 does not properly separate fields when generating dialback keys, which allows remote attackers to spoof XMPP network domains via a crafted stream id and domain name that is included in the target domain as a suffix.

CVSS3: 5.3
github
больше 3 лет назад

The generate_dialback function in the mod_dialback module in Prosody before 0.9.10 does not properly separate fields when generating dialback keys, which allows remote attackers to spoof XMPP network domains via a crafted stream id and domain name that is included in the target domain as a suffix.

EPSS

Процентиль: 71%
0.00681
Низкий