CVE-2014-2744

CVSS V2 High 7.8 CVSS V3 None
Description
plugins/mod_compression.lua in (1) Prosody before 0.9.4 and (2) Lightwitch Metronome through 3.4 negotiates stream compression while a session is unauthenticated, which allows remote attackers to cause a denial of service (resource consumption) via compressed XML elements in an XMPP stream, aka an "xmppbomb" attack.
Overview
  • CVE ID
  • CVE-2014-2744
  • Assigner
  • security@debian.org
  • Vulnerability Status
  • Modified
  • Published Version
  • 2014-04-11T01:55:06
  • Last Modified Date
  • 2014-04-19T04:48:47
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:lightwitch:metronome:*:*:*:*:*:*:*:* 1 OR 3.4
cpe:2.3:a:prosody:prosody:*:*:*:*:*:*:*:* 1 OR 0.9.3
cpe:2.3:a:prosody:prosody:0.1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:prosody:prosody:0.2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:prosody:prosody:0.3.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:prosody:prosody:0.4.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:prosody:prosody:0.4.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:prosody:prosody:0.4.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:prosody:prosody:0.5.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:prosody:prosody:0.5.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:prosody:prosody:0.5.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:prosody:prosody:0.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:prosody:prosody:0.6.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:prosody:prosody:0.6.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:prosody:prosody:0.7.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:prosody:prosody:0.8.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:prosody:prosody:0.8.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:prosody:prosody:0.8.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:prosody:prosody:0.9.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:prosody:prosody:0.9.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:prosody:prosody:0.9.2:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:N/I:N/A:C
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • NONE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 7.8
  • Severity
  • HIGH
  • Exploitability Score
  • 10
  • Impact Score
  • 6.9
History
Created Old Value New Value Data Type Notes
2022-05-10 10:35:12 Added to TrackCVE
2022-12-01 22:37:06 2014-04-11T01:55Z 2014-04-11T01:55:06 CVE Published Date updated
2022-12-01 22:37:06 2014-04-19T04:48:47 CVE Modified Date updated
2022-12-01 22:37:06 Modified Vulnerability Status updated