Vulnerability Details : CVE-2004-1378
The expat XML parser code, as used in the open source Jabber (jabberd) 1.4.3 and earlier, jadc2s 0.9.0 and earlier, and possibly other packages, allows remote attackers to cause a denial of service (application crash) via a malformed packet to a socket that accepts XML connections.
Vulnerability category: Denial of service
Products affected by CVE-2004-1378
- cpe:2.3:a:jabberstudio:jabberd:1.4:*:*:*:*:*:*:*
- cpe:2.3:a:jabberstudio:jabberd:1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:jabberstudio:jabberd:1.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:jabberstudio:jabberd:1.4.2a:*:*:*:*:*:*:*
- cpe:2.3:a:jabberstudio:jabberd:1.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:jabberstudio:jadc2s:0.6:*:*:*:*:*:*:*
- cpe:2.3:a:jabberstudio:jadc2s:0.7:*:*:*:*:*:*:*
- cpe:2.3:a:jabberstudio:jadc2s:0.8:*:*:*:*:*:*:*
- cpe:2.3:a:jabberstudio:jadc2s:0.9:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2004-1378
9.22%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2004-1378
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
References for CVE-2004-1378
-
http://www.securityfocus.com/bid/11231
Patch
-
http://marc.info/?l=bugtraq&m=109583829122679&w=2
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/17467
-
http://securitytracker.com/id?1011384
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/17466
-
http://www.vuxml.org/freebsd/2e25d38b-54d1-11d9-b612-000c6e8f12ef.html
-
http://www.gentoo.org/security/en/glsa/glsa-200409-31.xml
Patch
-
http://devel.amessage.info/jabberd14/
Patch
-
http://securitytracker.com/id?1011383
-
http://mail.jabber.org/pipermail/jabberd/2004-September/002004.html
Jump to