Vulnerability Details : CVE-2014-2829
Erlang Solutions MongooseIM through 1.3.1 rev. 2 does not properly restrict the processing of compressed XML elements, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XMPP stream, aka an "xmppbomb" attack.
Vulnerability category: Denial of service
Products affected by CVE-2014-2829
- cpe:2.3:a:erlang-solutions:mongooseim:*:rev2:*:*:*:*:*:*
- cpe:2.3:a:erlang-solutions:mongooseim:1.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:erlang-solutions:mongooseim:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:erlang-solutions:mongooseim:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:erlang-solutions:mongooseim:1.3.1:-:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-2829
0.37%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 72 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-2829
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | AV:N/AC:L/Au:N/C:N/I:N/A:C |
10.0
|
6.9
|
NIST |
CWE ids for CVE-2014-2829
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-2829
-
https://github.com/esl/MongooseIM/commit/586d96cc12ef218243a3466354b4d208b5472a6c
Merge pull request #167 from esl/zlib_cwe400_fix · esl/MongooseIM@586d96c · GitHubExploit;Patch
-
http://xmpp.org/resources/security-notices/uncontrolled-resource-consumption-with-highly-compressed-xmpp-stanzas/
404 Not Found
Jump to