Lucene search

K
debianDebianDEBIAN:DSA-2895-2:0AC35
HistoryApr 20, 2014 - 11:42 p.m.

[SECURITY] [DSA 2895-2] prosody regression update

2014-04-2023:42:59
lists.debian.org
7

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.03 Low

EPSS

Percentile

90.7%


Debian Security Advisory DSA-2895-2 [email protected]
http://www.debian.org/security/ Luciano Bello
April 21, 2014 http://www.debian.org/security/faq


Package : prosody
CVE ID : CVE-2014-2744 CVE-2014-2745
Debian Bug : 743836

The update for prosody in DSA 2895 caused a regression when a client
logins with the compression functionality activated. This update corrects
that problem. For reference, the original advisory text follows.

A denial-of-service vulnerability has been reported in Prosody, a XMPP
server. If compression is enabled, an attacker might send highly-com-
pressed XML elements (attack known as "zip bomb") over XMPP streams and
consume all the resources of the server.

For the stable distribution (wheezy), this problem has been fixed in
version 0.8.2-4+deb7u2 of prosody.

We recommend that you upgrade your prosody package.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: [email protected]

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.03 Low

EPSS

Percentile

90.7%