lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 04 Apr 2014 19:48:14 +0200
From: Giancarlo Pellegrino <gpellegrino@...tu-darmstadt.de>
To: fulldisclosure@...lists.org
Subject: [FD] Uncontrolled Resource Consumption with Highly-Compressed XMPP
	Stanzas

Hi all,


Several XMPP server implementations that support application-layer 
compression (XEP-0138) suffer from an uncontrolled resource consumption 
vulnerability (CWE-400). This vulnerability can be remotely exploited by 
attackers to mount Denial-of-Service attacks by sending 
highly-compressed XML elements over XMPP streams.

Affected servers are reported to:

1. Consume the virtual memory; in certain cases, it has been reported 
that servers are terminated by the operating system for out of memory 
conditions;
2. Monopolize the use of the CPU;
3. In certain cases, not allow administrators to disable stream compression.

It is best to upgrade to corrected server code. An alternative, 
temporary workaround is to disable XMPP-level compression.

More details and the list of affected implementations can be found in 
the security notice published by the XMPP Standards Foundation:

http://xmpp.org/resources/security-notices/uncontrolled-resource-consumption-with-highly-compressed-xmpp-stanzas/


Thank you.

Best Regards,
Giancarlo Pellegrino

_______________________________________________
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ