FreeBSD : jabberd -- denial-of-service vulnerability (2e25d38b-54d1-11d9-b612-000c6e8f12ef)

Medium Nessus Plugin ID 18889


The remote FreeBSD host is missing a security-related update.


Jose Antonio Calvo discovered a bug in the Jabber 1.x server.
According to Matthias Wimmer :

Without this patch, it is possible to remotly crash jabberd14, if there is access to one of the following types of network sockets :

- Socket accepting client connections

- Socket accepting connections from other servers

- Socket connecting to an other Jabber server

- Socket accepting connections from server components

- Socket connecting to server components

This is any socket on which the jabberd server parses XML!

The problem existed in the included expat XML parser code. This patch removes the included expat code from jabberd14 and links jabberd against an installed version of expat.


Update the affected package.

See Also

Plugin Details

Severity: Medium

ID: 18889

File Name: freebsd_pkg_2e25d38b54d111d9b612000c6e8f12ef.nasl

Version: $Revision: 1.14 $

Type: local

Published: 2005/07/13

Modified: 2016/05/26

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:jabber, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2004/12/26

Vulnerability Publication Date: 2004/09/19

Reference Information

CVE: CVE-2004-1378