FreeBSD : jabberd -- domain spoofing in server dialback protocol (4d1d2f6d-ec94-11e1-8bd8-0022156e8794)

This script is Copyright (C) 2012-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

XMPP Standards Foundation reports :

Some implementations of the XMPP Server Dialback protocol (RFC
3920/XEP-0220) have not been checking dialback responses to ensure
that validated results are correlated with requests.

An attacking server could spoof one or more domains in communicating
with a vulnerable server implementation, thereby avoiding the
protections built into the Server Dialback protocol.

See also :

http://xmpp.org/resources/security-notices/server-dialback/
http://www.nessus.org/u?f47d46d7

Solution :

Update the affected package.

Risk factor :

Medium / CVSS Base Score : 5.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 61639 ()

Bugtraq ID:

CVE ID: CVE-2012-3525

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now