Skip to content

Erlang Solutions MongooseIM vulnerable to denial of service (DoS) via crafted XMPP stream

High severity GitHub Reviewed Published May 17, 2022 to the GitHub Advisory Database • Updated Jan 27, 2023

Package

erlang MongooseIM (Erlang)

Affected versions

<= 1.3.1

Patched versions

1.3.2

Description

Erlang Solutions MongooseIM through 1.3.1 rev. 2 does not properly restrict the processing of compressed XML elements, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XMPP stream, aka an "xmppbomb" attack.

References

Published by the National Vulnerability Database Apr 11, 2014
Published to the GitHub Advisory Database May 17, 2022
Reviewed Jul 1, 2022
Last updated Jan 27, 2023

Severity

High

EPSS score

0.518%
(77th percentile)

Weaknesses

No CWEs

CVE ID

CVE-2014-2829

GHSA ID

GHSA-5v5w-44w6-q5hv

Source code

Dependabot alerts are not supported on some or all of the ecosystems on this advisory.

Learn more about GitHub language support

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.