Full Disclosure mailing list archives
Uncontrolled Resource Consumption with Highly-Compressed XMPP Stanzas
From: Giancarlo Pellegrino <gpellegrino () cs tu-darmstadt de>
Date: Fri, 04 Apr 2014 19:48:14 +0200
Hi all,Several XMPP server implementations that support application-layer compression (XEP-0138) suffer from an uncontrolled resource consumption vulnerability (CWE-400). This vulnerability can be remotely exploited by attackers to mount Denial-of-Service attacks by sending highly-compressed XML elements over XMPP streams.
Affected servers are reported to:1. Consume the virtual memory; in certain cases, it has been reported that servers are terminated by the operating system for out of memory conditions;
2. Monopolize the use of the CPU; 3. In certain cases, not allow administrators to disable stream compression.It is best to upgrade to corrected server code. An alternative, temporary workaround is to disable XMPP-level compression.
More details and the list of affected implementations can be found in the security notice published by the XMPP Standards Foundation:
http://xmpp.org/resources/security-notices/uncontrolled-resource-consumption-with-highly-compressed-xmpp-stanzas/ Thank you. Best Regards, Giancarlo Pellegrino _______________________________________________ Sent through the Full Disclosure mailing list http://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Current thread:
- Uncontrolled Resource Consumption with Highly-Compressed XMPP Stanzas Giancarlo Pellegrino (Apr 04)