Lucene search

K
gentooGentoo FoundationGLSA-201612-50
HistoryDec 31, 2016 - 12:00 a.m.

Openfire: Multiple vulnerabilities

2016-12-3100:00:00
Gentoo Foundation
security.gentoo.org
35

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

AI Score

5.3

Confidence

High

EPSS

0.945

Percentile

99.2%

Background

Openfire (formerly Wildfire) is a cross-platform real-time collaboration server based on the XMPP (Jabber) protocol.

Description

Multiple vulnerabilities have been discovered in Openfire. Please review the CVE identifiers referenced below for details.

Impact

A remote attacker could bypass the CSRF protection mechanism, conduct Cross-Site Scripting attacks, or an authenticated remote attacker could gain privileges while accessing Openfire’s web interface.

Workaround

There is no known workaround at this time.

Resolution

All Openfire users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-im/openfire-4.1.0"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-im/openfire<Β 4.1.0UNKNOWN

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

AI Score

5.3

Confidence

High

EPSS

0.945

Percentile

99.2%