FreeBSD : openfire -- Openfire No Password Changes Security Bypass (e3e30d99-58a8-4a3f-8059-a8b7cd59b881)

This script is Copyright (C) 2009-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Secunia reports :

A vulnerability has been reported in Openfire which can be exploited
by malicious users to bypass certain security restrictions. The
vulnerability is caused due to Openfire not properly respecting the no
password changes setting which can be exploited to change passwords by
sending jabber:iq:auth passwd_change requests to the server.

See also :

http://www.igniterealtime.org/issues/browse/JM-1532
http://www.igniterealtime.org/community/message/190288#190288
http://www.nessus.org/u?aba3cd0d

Solution :

Update the affected package.

Risk factor :

Medium / CVSS Base Score : 4.0
(CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:N)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 38678 (freebsd_pkg_e3e30d9958a84a3f8059a8b7cd59b881.nasl)

Bugtraq ID:

CVE ID: CVE-2009-1596

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now