FreeBSD : jabberd -- denial-of-service vulnerability (2e25d38b-54d1-11d9-b612-000c6e8f12ef)

medium Nessus Plugin ID 18889

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Jose Antonio Calvo discovered a bug in the Jabber 1.x server.
According to Matthias Wimmer :

Without this patch, it is possible to remotly crash jabberd14, if there is access to one of the following types of network sockets :

- Socket accepting client connections

- Socket accepting connections from other servers

- Socket connecting to an other Jabber server

- Socket accepting connections from server components

- Socket connecting to server components

This is any socket on which the jabberd server parses XML!

The problem existed in the included expat XML parser code. This patch removes the included expat code from jabberd14 and links jabberd against an installed version of expat.

Solution

Update the affected package.

See Also

http://www.nessus.org/u?427de2d1

https://mail.jabber.org/pipermail/jabberd/2004-September/002004.html

http://www.nessus.org/u?a5c36903

Plugin Details

Severity: Medium

ID: 18889

File Name: freebsd_pkg_2e25d38b54d111d9b612000c6e8f12ef.nasl

Version: 1.18

Type: local

Published: 7/13/2005

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:jabber, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 12/26/2004

Vulnerability Publication Date: 9/19/2004

Reference Information

CVE: CVE-2004-1378