Vulnerability Description
plugins/mod_compression.lua in Lightwitch Metronome through 3.4 does not properly restrict the processing of compressed XML elements, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XMPP stream, aka an "xmppbomb" attack.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lightwitch | Metronome | <= 3.4 |
Related Weaknesses (CWE)
References
- http://code.lightwitch.org/metronome/rev/49f47277a411ExploitPatch
- http://openwall.com/lists/oss-security/2014/04/07/7
- http://openwall.com/lists/oss-security/2014/04/09/1
- http://xmpp.org/resources/security-notices/uncontrolled-resource-consumption-wit
- http://code.lightwitch.org/metronome/rev/49f47277a411ExploitPatch
- http://openwall.com/lists/oss-security/2014/04/07/7
- http://openwall.com/lists/oss-security/2014/04/09/1
- http://xmpp.org/resources/security-notices/uncontrolled-resource-consumption-wit
FAQ
What is CVE-2014-2743?
CVE-2014-2743 is a vulnerability with a CVSS score of 7.8 (HIGH). plugins/mod_compression.lua in Lightwitch Metronome through 3.4 does not properly restrict the processing of compressed XML elements, which allows remote attackers to cause a denial of service (resour...
How severe is CVE-2014-2743?
CVE-2014-2743 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-2743?
Check the references section above for vendor advisories and patch information. Affected products include: Lightwitch Metronome.