Vulnerability Description
Erlang Solutions MongooseIM through 1.3.1 rev. 2 does not properly restrict the processing of compressed XML elements, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XMPP stream, aka an "xmppbomb" attack.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Erlang-Solutions | Mongooseim | <= 1.3.1 |
Related Weaknesses (CWE)
References
- http://xmpp.org/resources/security-notices/uncontrolled-resource-consumption-wit
- https://github.com/esl/MongooseIM/commit/586d96cc12ef218243a3466354b4d208b5472a6ExploitPatch
- http://xmpp.org/resources/security-notices/uncontrolled-resource-consumption-wit
- https://github.com/esl/MongooseIM/commit/586d96cc12ef218243a3466354b4d208b5472a6ExploitPatch
FAQ
What is CVE-2014-2829?
CVE-2014-2829 is a vulnerability with a CVSS score of 7.8 (HIGH). Erlang Solutions MongooseIM through 1.3.1 rev. 2 does not properly restrict the processing of compressed XML elements, which allows remote attackers to cause a denial of service (resource consumption)...
How severe is CVE-2014-2829?
CVE-2014-2829 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-2829?
Check the references section above for vendor advisories and patch information. Affected products include: Erlang-Solutions Mongooseim.