CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
AI Score
Confidence
High
EPSS
Percentile
86.8%
nio/XMLLightweightParser.java in Ignite Realtime Openfire before 3.9.2 does not properly restrict the processing of compressed XML elements, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XMPP stream, aka an “xmppbomb” attack.
Vendor | Product | Version | CPE |
---|---|---|---|
igniterealtime | openfire | * | cpe:2.3:a:igniterealtime:openfire:*:*:*:*:*:*:*:* |
community.igniterealtime.org/thread/52317
fisheye.igniterealtime.org/changelog/openfiregit?cs=3aec383e07ee893b77396fe946766bbd3758af77
openwall.com/lists/oss-security/2014/04/07/7
openwall.com/lists/oss-security/2014/04/09/1
www.kb.cert.org/vuls/id/495476
xmpp.org/resources/security-notices/uncontrolled-resource-consumption-with-highly-compressed-xmpp-stanzas/