5
CVSSv2

CVE-2016-0756

Published: 29/01/2016 Updated: 06/12/2016
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 5.3 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

The generate_dialback function in the mod_dialback module in Prosody prior to 0.9.10 does not properly separate fields when generating dialback keys, which allows remote malicious users to spoof XMPP network domains via a crafted stream id and domain name that is included in the target domain as a suffix.

Vulnerable Product Search on Vulmon Subscribe to Product

prosody prosody

Vendor Advisories

It was discovered that insecure handling of dialback keys may allow a malicious XMPP server to impersonate another server For the oldstable distribution (wheezy), this problem has been fixed in version 082-4+deb7u4 For the stable distribution (jessie), this problem has been fixed in version 097-2+deb8u3 For the unstable distribution (sid), t ...